Chinese spyware code was copied from America's NSA: researchers

Chinese spyware code was copied from America's NSA: researchers

WASHINGTON (Reuters) - Chinese spies used code first developed by the U.S. National Security Agency to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software developed by governments can boomerang against their creators.

New malware found on 30,000 Macs has security pros stumped

New malware found on 30,000 Macs has security pros stumped

Red Canary researchers worked with their counterparts at Malwarebytes, with the latter group finding Silver Sparrow installed on 29,139 macOS endpoints as of Wednesday.

Visa warns of new sophisticated credit card skimmer dubbed Baka

Visa warns of new sophisticated credit card skimmer dubbed Baka

Baka is a sophisticated e-skimmer developed by a skilled malware developer that implements a unique obfuscation method and loader.The skimmer loads dynamically to avoid static malware scanners and uses unique encryption parameters for each victim to obfuscate the malicious code.” reads the published by VISA.

Snapdragon chip flaws put >1 billion Android phones at risk of data theft

Snapdragon chip flaws put >1 billion Android phones at risk of data theft

“While DSP chips provide a relatively economical solution that allows mobile phones to provide end users with more functionality and enable innovative features—they do come with a cost,” researchers from security firm Check Point wrote in a brief report of the vulnerabilities they discovered.

Amazon’s new smart shopping cart lets you check out without a cashier

Amazon’s new smart shopping cart lets you check out without a cashier

The Dash Cart links with your Amazon account and tracks the items you place inside The Dash Cart is coming first to Amazon’s grocery store in the Woodland Hills neighborhood of Los Angeles.

LinkedIn says it will stop repeatedly copying iOS clipboard

LinkedIn says it will stop repeatedly copying iOS clipboard

LinkedIn plans to stop its app from repeatedly copying the contents of an iOS device’s clipboard, after a user highlighted the seemingly privacy-invasive practice earlier this week.

Google introduces new default auto-delete settings for location and YouTube history.

Google introduces new default auto-delete settings for location and YouTube history.

Indeed, incognito mode has been baked into Chrome 's browser for over a decade, but the company added it to YouTube in 2018, followed by Google Maps a year later, allowing users to temporarily stop their search activities from being saved to their Google Account.

Security lapse at India's Jio exposed coronavirus symptom checker results

Security lapse at India's Jio exposed coronavirus symptom checker results

The symptom checker allows anyone to check their symptoms from their phone or Jio's website to see if they may have become infected with COVID-19.But a security lapse exposed one of the symptom checker's core databases to the internet without a password, TechCrunch has found.

GitHub - 0x01h/gif-tracking-protection: Protect your privacy from GIF trackers. Strip data parameters from GIF requests and send them through DuckDuckGo proxy. 🔏

GitHub - 0x01h/gif-tracking-protection: Protect your privacy from GIF trackers. Strip data parameters from GIF requests and send them through DuckDuckGo proxy. 🔏

If nothing happens, download the GitHub extension for Visual Studio and try again.If nothing happens, download GitHub Desktop and try again.If nothing happens, download GitHub Desktop and try again.Want to be notified of new releases in 0x01h/gif-tracking-protection.

How to avoid Coronavirus scam websites, calls, and texts

How to avoid Coronavirus scam websites, calls, and texts

The FTC has come up with this short list of follows to avoid being scammed out of your stimulus check or money as related to COVID-19.

Why I Deactivated Tracking in MailChimp

Why I Deactivated Tracking in MailChimp

For example, I can see: How many times you opened each email, and whenOn which links you clicked how many times, and whenYour locationAnd the whole history of your interactions with my newsletters So I asked myself some questions: Do I track regular emails like that?Do I use those stats in any meaningful way?

All the Ways Facebook Tracks You—and How to Limit It

All the Ways Facebook Tracks You—and How to Limit It

The social network behemoth says it uses your data to show relevant ads and keep you safe; if someone signs into your account from a country you're not usually in, for instance, Facebook can flag the activity as suspicious.The best way to limit Facebook's tracking is to quit all three apps for good.

Cryptocurrency is the Second Amendment of the Internet

Cryptocurrency is the Second Amendment of the Internet

My conclusion, which I cover in this article, is that platforms based on cryptocurrency tech are uniquely good at one thing in particular: not being shut down, a property known more formally as “censorhip-resistance.” And I will argue in this post that this property alone causes cryptocurrency tech to act as a “second amendment of the internet,” providing a check against information-based oppression that is analogous to how the right to bear arms acts as a check against physical oppression.

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

“Our team found a way of manipulating specific actions and intents,” Erez Yalon, director of security research at Checkmarx said, “making it possible for any application, without specific permissions, to control the Google Camera app.

How to Lock Down Your Health and Fitness Data

How to Lock Down Your Health and Fitness Data

Photograph: AppleSpeaking of deleting data, pick Devices from the previous menu, then choose a device from the list, and you can erase everything Apple Health holds on you with a couple of taps.

Amazon tests Whole Foods payment system that uses hands as ID

Amazon tests Whole Foods payment system that uses hands as ID

The high-tech sensors are different from fingerprint scanners found on devices like the iPhone and don’t require users to physically touch their hands to the scanning surface.At Amazon’s budding chain of “Go” convenience stores that launched last year, customers use a phone app to check in at a turnstile.

Breach at Hy-Vee Supermarket Chain Tied to Sale of 5M+ Stolen Credit, Debit Cards — Krebs on Security

Breach at Hy-Vee Supermarket Chain Tied to Sale of 5M+ Stolen Credit, Debit Cards — Krebs on Security

Hy-Vee, based in Des Moines, announced on Aug. 14 it was investigating a data breach involving payment processing systems that handle transactions at some Hy-Vee fuel pumps, drive-thru coffee shops and restaurants.

1.5% of Chrome Users' Passwords Are Known to Be Compromised

1.5% of Chrome Users' Passwords Are Known to Be Compromised

1.5% of passwords used in Chrome are unsafe and have been released in data breaches, according to new information from Google.In February, a new feature was introduced to the Google Chrome browser which checks whether users’ passwords are secure.

Juul's app-connected e-cigarette keeps tabs on your vaping

Juul's app-connected e-cigarette keeps tabs on your vaping

The product, called the Juul C1, pairs with an Android-only app via Bluetooth and has been launched in the UK after a trial in Canada, as reported by The Financial Times.

What’s that liquid? IBM’s flavor-identifying ‘e-tongue’ will tell you

What’s that liquid? IBM’s flavor-identifying ‘e-tongue’ will tell you

“We’re very good as humans at being able to recognize different liquids,” Patrick Ruch, one of the researchers working on the e-tongue project, told Digital Trends.

Reflectacles Ghost

Reflectacles Ghost

Ghost obscure your face from surveillance and facial recognition on infrared cctv cams, and make you noticeable to drivers at night. Or just use a browser that allows all processes for checkout. * Transitions lenses turn medium gray in sunlight and are clear indoors.

Passbase  -  Blog - Identity Checking - Why Digital Identities Drive Security And Privacy

Passbase - Blog - Identity Checking - Why Digital Identities Drive Security And Privacy

In today's hyper-connected world, aspects that cover user verification, reducing fraud, checking identity theft and enabling identity checking services are some of the main focus points for businesses, regulators and government bodies. For businesses, identity theft means losses, highlighting the need for companies to cautiously leverage identity checking services and identity card checking for user verification.

Walmart uses AI cameras to spot thieves

Walmart uses AI cameras to spot thieves

Asda, which is owned by Walmart, and UK supermarket Sainsbury's both told the BBC they did not use image recognition cameras in their stores.

Facebook Wants To Combat Fake News With ID Checks

Facebook Wants To Combat Fake News With ID Checks

I wanted to test how quickly Facebook’s algorithm could sniff out a fake profile, so I opened one under an assumed Arabic name, set my location in the Middle East and started indiscriminately sharing secular political posts.

Remote Code Execution on most Dell computers

Remote Code Execution on most Dell computers

To bypass the Referer/Origin check, we have a few options: Find a Cross Site Scripting vulnerability in any of Dell’s websites (I should only have to find one on the sites designated for SupportAssist) Find a Subdomain Takeover vulnerability Make the request from a local program Generate a random subdomain name and use an external machine to DNS Hijack the victim.

How to Sweep For Bugs and Hidden Cameras

How to Sweep For Bugs and Hidden Cameras

Bugs always need a way to deliver the data they're gathering to their owners, so deep bug sweeps should go beyond regular electronics detection to scan for laser beam and microwave transmission setups.

How Australia Will Handle Cryptocurrency Hacks After Coincheck

How Australia Will Handle Cryptocurrency Hacks After Coincheck

What the Coincheck hack tells us about how Australian regulators will handle a cryptocurrency hack Hacks like the one on Coincheck expose gullible investors to risk, but it also means funds could be flowing undetected into the hands of money launderers and terrorists.

Check to See If Your Next Chrome Extension Is Safe with This Website

Check to See If Your Next Chrome Extension Is Safe with This Website

Advertisement According to the data from Duo Labs’ initial survey of the Chrome Web Store in January, which checked 120,463 Chrome apps and extensions, almost 85 percent of extensions have no privacy policy, 35 percent could read your data on any website, and almost 32 percent—nearly a third—feature known security vulnerabilities.

Marriott letting guests check to see if they were affected by data breach

Marriott letting guests check to see if they were affected by data breach

Marriott promised to reply to form submissions “as soon as reasonably practicable and consistent with applicable law.” Last month, Marriott disclosed that five million unencrypted passport numbers were stolen in the breach of its Starwood hotel reservation system.

Firefox 67 to display breach alerts

Firefox 67 to display breach alerts

Mozilla plans to extend the functionality of Firefox Monitor by displaying breach alerts to users of the browser. The feature was passive at that time; users could check whether an account -- email address -- was found on hacked passwords lists, and they could sign up to receive alerts when a particular account was discovered on new leaked lists.