App Used by Netanyahu's Likud Leaks Israel's Entire Voter Registry

App Used by Netanyahu's Likud Leaks Israel's Entire Voter Registry

The voter registry was uploaded by Likud to the Elector app, which is used by the party to manage Election Day. The firm that developed the application, Feed-b, commented that the vulnerability was a “one-off incident that was immediately dealt with," and that security measures have since been boosted.

How my application ran away and called home from Redmond

How my application ran away and called home from Redmond

After about a minute later we received Slack alert that the Beacon has managed to find a leak from the lab environment.I logged in to my Windows test machine to see if the Beacon is still running.

Over 750,000 applications for US birth certificate copies exposed online

Over 750,000 applications for US birth certificate copies exposed online

An online company that allows users to obtain a copy of their birth and death certificates from U.S. state governments has exposed a massive cache of applications — including their personal information.

Filmmakers sue State Department over social media surveillance rules

Filmmakers sue State Department over social media surveillance rules

Earlier this month, the Department of Homeland Security revealed that it wanted to expand facial recognition usage to encompass identifying US citizens as they enter and exit the US, although it backed off this decision under criticism.

$5B class action lawsuit accusing Apple of selling customer data is thrown out

$5B class action lawsuit accusing Apple of selling customer data is thrown out

A $5B class action lawsuit that accused Apple of selling customer data has been rejected for the second and final time.Patently Apple reports that the lawsuit, filed in May, alleged that Apple sold customer-identifying data relating to iTunes purchases.

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

“Our team found a way of manipulating specific actions and intents,” Erez Yalon, director of security research at Checkmarx said, “making it possible for any application, without specific permissions, to control the Google Camera app.

Vulnerability in WebEx and Zoom allows hackers to access their sessions

Vulnerability in WebEx and Zoom allows hackers to access their sessions

Vulnerability testing specialists point out that any web application that uses numeric or alphanumeric identifiers is exposed to enumeration attacks.

The application ZAO sparked criticism on privacy issues

The application ZAO sparked criticism on privacy issues

An earlier version of the user agreement for the application stated that consumers who carry their images to ZAO agree to hand over their intellectual property rights to their faces, while allowing the application to use their images for marketing purposes.

Apple accidentally reopens security flaw in latest iOS version

Apple accidentally reopens security flaw in latest iOS version

Stefan Esser, an iPhone security expert, tweeted an additional warning: “I hope people are aware that with a public jailbreak being available for the latest iOS 12.4 people must be very careful what apps they download from the Apple AppStore.

How to disable OK Google and Google Assistant on Android devices

How to disable OK Google and Google Assistant on Android devices

If OK Google or Google Assistant are active on your Android device but you are not using these tools, you may want to consider disabling those.Here is how you disable OK Google on your device:Open the Google application on the Android device.

State Department now requires U.S. visa applicants to share social media accounts

State Department now requires U.S. visa applicants to share social media accounts

The new visa application forms list a number of social media platforms, including Facebook, Twitter and YouTube and require the applicant to provide any account names they may have had on them over the previous five years.

6 Reasons Why Face App Puts Your Privacy at Serious Risk

6 Reasons Why Face App Puts Your Privacy at Serious Risk

It is another reason why you should not use Face App. Also Read: 10 Interesting Facts About Nostalgia We Bet You Didn’t Know About. Here on Face App you share your pictures and username publicly with others and you do not know who can use your personal details.

As Russian “FaceApp” gobbles up user photos, Schumer asks FBI to investigate

As Russian “FaceApp” gobbles up user photos, Schumer asks FBI to investigate

Senate Minority Leader Chuck Schumer (D-N.Y.) has called for a federal investigation into FaceApp, saying the Russian-operated mobile application "could pose national security and privacy risks for millions of US citizens.". This has raised privacy concerns, as Americans are uploading photographs and device-related data to a service operated by a company based in Russia.

Upgrade Readiness

Upgrade Readiness

Upgrade Readiness is a feature in Windows that according to [1], "collects system, application, and driver data for analysis. It can collect "detailed computer and application inventory" and "guidance and insights into application and driver compatibility issues, with suggested fixes".

Foxtel files legal application to block proxy websites

Foxtel files legal application to block proxy websites

"The Copyright Amendment Bill will ensure a broader range of overseas websites and file-hosting services widely used for sharing music and movies are within the scope of the scheme, and provide a means for proxy and mirror pirate sites to be blocked quickly," the government said at the time.

App Analysis: Nimses

App Analysis: Nimses

PewDiePie noticed this outcry and came back to ensure his users that the application was not a scam, that the app collects a similar amount of data as other social media applications, and that his fans are spreading "misinformation".

OnePlus was leaking user emails in its ‘Shot on OnePlus’ wallpapers app

OnePlus was leaking user emails in its ‘Shot on OnePlus’ wallpapers app

If the photo is selected, it appears publicly in the Shot on OnePlus app and within the Gallery on their website. If the photo is selected by OnePlus, it appears publicly in the Shot on OnePlus app and within the gallery on their website.

The future will be recorded, on your smart speaker

The future will be recorded, on your smart speaker

(Bloomberg Opinion) -- Amazon’s patent application for an always-on feature for Alexa, its popular voice-activated personal assistant, has raised a lot of concern.

Newly Released Amazon Patent Shows Just How Much Creepier Alexa Can Get

Newly Released Amazon Patent Shows Just How Much Creepier Alexa Can Get

Alexa, Amazon's virtual assistant system that runs on the company's Echo series of smart speakers, works by listening out for a 'wakeword' that tells the device to turn on its extended speech recognition systems in order to respond to spoken commands.

Why Facebook Privacy is a Hoax? Facebook censoring crypto-related messages

Why Facebook Privacy is a Hoax? Facebook censoring crypto-related messages

Maybe Facebook is happy enough by being able to read your SMS and your call history on Android devices. Facebook has been collecting call history and SMS data from Android devices. Facebook just made some big privacy promises, and they all hinge on encryption.

Brooklyn Apartment Tenants Rise Up Against Landlord’s Plans to Install Facial Recognition Technology

Brooklyn Apartment Tenants Rise Up Against Landlord’s Plans to Install Facial Recognition Technology

The landlord, Nelson Management Group, filed an application to install the tech with New York State Homes & Community Renewal (NYSHCR)—which can approve or deny the request. This is the first time a property manager filed an application for facial recognition technology with NYSHCR according to The Brooklyn Eagle.

OpenSnitch – an Application Firewall for Linux [Review]

OpenSnitch – an Application Firewall for Linux [Review]

The main thing that OpenSnitch does is track internet requests made by applications you have installed. OpenSnitch allows you to create rules for which apps to allow to access the internet and which to block. The installation instructions on the OpenSnitch GitHub page are aimed at Ubuntu users.

BEST APP TO HELP YOU TRACK EMBEDDED IN YOUR PHONES?

BEST APP TO HELP YOU TRACK EMBEDDED IN YOUR PHONES?

For Android clients, the application Exodus Privacy can enable you to distinguish what trackers are on your telephone, and what publicizing systems they are giving data. For Android clients, the application Exodus Privacy can enable you to distinguish what trackers are on your telephone, and what publicizing systems they are giving data.

A Pod world: How you’d trade your data for services over a decentralized internet

A Pod world: How you’d trade your data for services over a decentralized internet

Late last year, open source startup Inrupt built an application based on the Solid standards that enables a more peer-to-peer internet with Personal Online Data Stores (Pods) for everyone.

Reasons to Abandon Windows For Linux

Reasons to Abandon Windows For Linux

Although you can download individual applications from websites and install them with a package manager that automates the process similar to Windows, finding new programs on Linux is generally as simple as searching for it in the software repository and clicking install.

China’s “democracy” includes mandatory apps, mass chat surveillance

China’s “democracy” includes mandatory apps, mass chat surveillance

Your voice is heard A February 22 China National Computer Emergency Response Team (CNCERT) alert warned that 486 MongoDB database servers out of approximately 25,000 such servers connected to the Internet had "information leakage risks." Apparently, some of those MongoDB servers were part of a social media and messaging collection and processing system used by Chinese law enforcement and security personnel to monitor and investigate citizens' communications.

Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT

Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT

Changing privacy settings (Medium – CVSS 5.3) Possible attack scenario: A malicious user – within BLE range – could track the victim because the device keeps the MAC address fixed due to a configuration in the Generic Attribute Profile (GATT).

KeePassXC Memory Security

KeePassXC Memory Security

Linux Memory Protection KeePassXC prevents the use of ptrace and generation of core dumps. The above memory protection techniques are all applied during the initial Bootstrap process before any data is loaded in to the application.

Android App with Facebook API Copied and Insecurely Stored User Data

Android App with Facebook API Copied and Insecurely Stored User Data

Android App with Facebook API Copied User Data The issue was reported to Facebook through their Data Abuse Bounty program, and the storage locations were secured in November last year.

Trust Models for Secure Network Connections

Trust Models for Secure Network Connections

by Andrii Fedotov · by Security Zone · Like (1) Comment ( ) Save Tweet {{ articles[0].views | formatCount}} Views Join the DZone community and get the full member experience.