Cheating, Policing, and School Surveillance

Cheating, Policing, and School Surveillance

I will, however, say this: anti-cheating software, whether it’s plagiarism detection or test proctoring — is “cop shit.” And cops do not belong on school grounds.Ed-tech didn't create the "cop shit" in the classroom or launch a culture of surveillance in schools by any means.

Gli sviluppatori stanno cercando tutti i modi possibili per aggirare il metodo anti tracciamento di Apple

Gli sviluppatori stanno cercando tutti i modi possibili per aggirare il metodo anti tracciamento di Apple

Ricordiamo infatti che a breve Apple, per evitare il tracciamento degli utenti tra le diverse app, chiederà agli utenti se vogliono condividere con quella singola app l’identificativo pubblicitario, il numero anonimo che permette ai possessori di due o più applicazioni di capire se la persona che le sta usando è la stessa persona o sono persone distinte.

Telegram feature exposes your precise address to hackers

Telegram feature exposes your precise address to hackers

Advertisement A proof-of-concept video the researcher sent to Telegram showed how he could discern the address of a People Nearby user when he used a free GPS spoofing app to make his phone report just three different locations.

The company that processes payments for Amazon and Swiggy has reported a data leak of over 100 million debit and credit cardholders

The company that processes payments for Amazon and Swiggy has reported a data leak of over 100 million debit and credit cardholders

In what could be a major data breach, information of over 100 million debit and credit card users from payments processor Juspay has leaked on the dark web.

Where next for ethical data and data privacy? (Includes interview)

Where next for ethical data and data privacy? (Includes interview)

Kingston begins his analysis by focusing on the importance of data privacy and its continuing trajectory, noting: “Driven by the number of data breaches and the continued systematic misuse of personal data from large corporations, consumer data privacy and its control will be a major focus in 2021.

Cyber safety laws: Troll, bully or OFFEND anyone online and you could cop a $110K fine under TOUGH new law

Cyber safety laws: Troll, bully or OFFEND anyone online and you could cop a $110K fine under TOUGH new law

Cyber bullies and online trolls could be slapped with huge fines of up to $110,000 under world-first laws to be introduced by the Federal Government.

Menstruation apps store excessive information, privacy charity says

Menstruation apps store excessive information, privacy charity says

Eva Blum-Dumontet, a senior researcher at Privacy International, who used five apps and then asked what information was held about her using a data subject access request, said reading the findings was “chilling” and “it makes us realise just how much data those apps actually collect, store and sometimes share with others.”.

Online trolls on notice as government pushes for 'world first' adult cyber abuse laws

Online trolls on notice as government pushes for 'world first' adult cyber abuse laws

National e-safety commissioner Julie Inman Grant says her agency will use proposed new powers to unmask and fine recidivist online trolls who use anonymous social media account to wage campaigns of hate and abuse.

Google told its scientists to 'strike a positive tone' in AI research - documents

Google told its scientists to 'strike a positive tone' in AI research - documents

A senior Google manager reviewing a study on content recommendation technology shortly before publication this summer told authors to “take great care to strike a positive tone,” according to internal correspondence read to Reuters.

Firefox 85 will improve privacy with network partitioning feature

Firefox 85 will improve privacy with network partitioning feature

Next month's stable release of Firefox 85 will include the anti-tracking feature networking partitioning to improve user privacy on the Internet.Next month's stable release of Firefox 85 will include the anti-tracking feature networking partitioning to improve user privacy on the Internet.

Alibaba facial recognition tech specifically picks out Uighur minority: Report

Alibaba facial recognition tech specifically picks out Uighur minority: Report

Advertisement Advertisement An archived record of the technology shows it can perform such tasks as "glasses inspection", "smile detection", whether the subject is "ethnic" and, specifically, "Is it Uighur".Consequently, if a Uighur livestreams a video on a website signed up to Cloud Shield, the software can detect that the user is Uighur and flag the video for review or removal, IPVM researcher Charles Rollet told Reuters.

Microsoft Teams sa troppe cose sugli studenti: la denuncia di un attivista dei diritti digitali

Microsoft Teams sa troppe cose sugli studenti: la denuncia di un attivista dei diritti digitali

L’accostamento di Insights a Teams per l’istruzione ha dato nuovi poteri di controllo agli insegnanti, perché sono di più gli strumenti a loro disposizione per monitorare attività, partecipazioni, compiti assegnati ed eseguiti degli studenti.

Former Salesforce science boss founds You.com to take on Google Search

Former Salesforce science boss founds You.com to take on Google Search

Here’s a conspiracy theory for you: According to the aforementioned TechCrunch article, Socher says he can compete with Search on account of his clever AI, nuanced approach that Google can’t just imitate and obliterate (the Innovator’s Dilemma), and the fact that Google’s embroiled in anti-trust suits.

IPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever

IPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever

Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device—over Wi-Fi, with no user interaction required at all.

Exclusive: WhiteHat Jr Bug Had Exposed Personal Data of 2.8 Lakh Students

Exclusive: WhiteHat Jr Bug Had Exposed Personal Data of 2.8 Lakh Students

The security researcher who discovered the vulnerability and made multiple responsible disclosures to the company between 6 October and 20 November wished not to be named.He has confirmed to The Quint that access to the company’s AWS servers have now been restricted by the company as of 21 November.

Exam surveillance software sparks global student revolt

Exam surveillance software sparks global student revolt

Khan began to suspect that it was his dark skin tone that rattled Examplify, a test proctoring platform adopted by New York state's law exams board during the COVID-19 pandemic.

Brave browser first to nix CNAME deception, the sneaky DNS trick used by marketers to duck privacy controls

Brave browser first to nix CNAME deception, the sneaky DNS trick used by marketers to duck privacy controls

Many of the online privacy abuses over the years have come from third-party resources like scripts and cookies, which is why third-party cookies are now blocked by default in Brave, Firefox, Safari, and Tor Browser.

Browser Privacy

Browser Privacy

The premise was, that the browser is free software (open source), with one exception (Vivaldi).The following browsers were tested: Firefox ESR 78.3.0 Midori 1.1.4 (Electron version) Vivaldi 3.4.2066 Brave 1.15.72 Epiphany 3.32.1.2 The method itself was relatively simple.

Singapore’s world-first face scan plan sparks privacy fears

Singapore’s world-first face scan plan sparks privacy fears

“We want to be innovative in applying technology for the benefit of our citizens and businesses,” Kwok Quek Sin, who works on digital identification at Singapore’s technology agency GovTech, told AFP.

If you used Firefox to access Twitter, your non-public info may have been exposed

If you used Firefox to access Twitter, your non-public info may have been exposed

This means that if you accessed Twitter from a shared or public computer via Mozilla Firefox and took actions like downloading your Twitter data archive or sending or receiving media via Direct Message, this information may have been stored in the browser’s cache even after you logged out of Twitter.

Facebook and UK Privacy Regulator ICO Complicit in subverting democracy

Facebook and UK Privacy Regulator ICO Complicit in subverting democracy

Responding to Channel 4’s latest revelations about the massive cache of voter data used by the Trump campaign, Jim Killock, Executive Director of Open Rights Group said: “This latest revelations lays bare two key problems.

Four eBay Employees To Plead Guilty In Bizarre Cyberstalking Plot

Four eBay Employees To Plead Guilty In Bizarre Cyberstalking Plot

Four former eBay employees will plead guilty to carrying out a targeted cyberstalking campaign against bloggers critical of the e-commerce giant, prosecutors said Wednesday, including sending items such as a bloody pig mask and a box of live cockroaches to a suburban Boston couple.

Smartphone Data Can Predict Depression and Anxiety

Smartphone Data Can Predict Depression and Anxiety

For the study, the researchers analyzed passively-collected cell phone data on social activity, screen time, location, physical exercise, and sleep patterns from volunteer participants.The researchers then matched the phone data against the fMRI results to predict higher or lower connectivity between the ventromedial prefrontal cortex and the amygdala.

Visa warns of new sophisticated credit card skimmer dubbed Baka

Visa warns of new sophisticated credit card skimmer dubbed Baka

Baka is a sophisticated e-skimmer developed by a skilled malware developer that implements a unique obfuscation method and loader.The skimmer loads dynamically to avoid static malware scanners and uses unique encryption parameters for each victim to obfuscate the malicious code.” reads the published by VISA.

Google’s new web standard could disable your ad-blocker

Google’s new web standard could disable your ad-blocker

According to Snyder, Web Bundles would allow malicious actors to evade privacy and security measures via a number of different avenues, including concealing dangerous URLs within the .wbn file and randomizing URLs for unwanted resources.

Over 54,000 scanned NSW driver's licences found in open cloud storage

Over 54,000 scanned NSW driver's licences found in open cloud storage

A spokesperson for Transport for NSW said the agency is working with Cyber Security NSW to investigate what it called "the alleged data issue relating to an AWS S3 bucket containing personal information including driver licences.".

Almost 235 Million YouTube, TikTok and Instagram Profiles Exposed Online by Unsecured Database

Almost 235 Million YouTube, TikTok and Instagram Profiles Exposed Online by Unsecured Database

Many users keep their profiles open, allowing companies such as Deep Social to collect that data and compile it further.While the database belonged to Social Data, the evidence point toward Deep Social, another company used to scrape data from online sources and has since dissolved.

Kindle Collects a Surprisingly Large Amount of Data

Kindle Collects a Surprisingly Large Amount of Data

Every page that is read sends the following information:Time a page was opened (when you turn to a new page, a timestamp is generated)The first character on the page (This might be something like character 7705 in the book, which is the exact location)The last character on the pageIf the page is images or textHere's a sample record that is sent with every page read:.

Instagram kept deleted photos and messages on its servers for more than a year

Instagram kept deleted photos and messages on its servers for more than a year

But when security researcher Saugat Pokharel requested a copy of photos and direct messages from the photo-sharing app, he was sent data he’d deleted more than a year ago, showing that the information had never been entirely removed from Instagram’s servers.

Snapdragon chip flaws put >1 billion Android phones at risk of data theft

Snapdragon chip flaws put >1 billion Android phones at risk of data theft

“While DSP chips provide a relatively economical solution that allows mobile phones to provide end users with more functionality and enable innovative features—they do come with a cost,” researchers from security firm Check Point wrote in a brief report of the vulnerabilities they discovered.