Social network Gab is down as its Twitter account disappears

Social network Gab is down as its Twitter account disappears

Screenshot by CNET Gab, a social media platform popular with right-wing users, stopped working Friday evening, with its website serving up an error message.A Gab Twitter account disappeared from the short-message service.

Police scrambling to recover more than 150,000 records wiped from UK database

Police scrambling to recover more than 150,000 records wiped from UK database

The policing minister, Kit Malthouse, said Home Office and law enforcement officials were working at pace to recover the data.“While the loss relates to individuals who were arrested and then released with no further action, I have asked officials and the police to confirm their initial assessment that there is no threat to public safety,” he said.

Europol and the European Commission inaugurate new decryption platform to tackle the challenge of encrypted material for law enforcement investigations

Europol and the European Commission inaugurate new decryption platform to tackle the challenge of encrypted material for law enforcement investigations

This week Europol launched an innovative decryption platform, developed in close cooperation with the European Commission's Joint Research Centre.The new Europol Decryption Platform, funded by the European Commission, will allow us to further enhance our support for Member State investigations.

Alibaba facial recognition tech specifically picks out Uighur minority: Report

Alibaba facial recognition tech specifically picks out Uighur minority: Report

Advertisement Advertisement An archived record of the technology shows it can perform such tasks as "glasses inspection", "smile detection", whether the subject is "ethnic" and, specifically, "Is it Uighur".Consequently, if a Uighur livestreams a video on a website signed up to Cloud Shield, the software can detect that the user is Uighur and flag the video for review or removal, IPVM researcher Charles Rollet told Reuters.

‘No one's safe under these new laws’: Critics rip proposed Surveillance Bill

‘No one's safe under these new laws’: Critics rip proposed Surveillance Bill

Deakin University criminology lecturer and Australian Privacy Foundation vice-president Monique Mann said the government has previously used the rhetoric of national security and terrorism to rush through legislation that has subsequently been used to target journalists and whistleblowers.

Facial recognition is getting better at making matches around face masks

Facial recognition is getting better at making matches around face masks

The error rates increased for every algorithm once researchers added masks to the test photos, even for facial recognition that was designed specifically for the coverings.One-to-many algorithms would test facial recognition's capabilities to match people against a group of images rather than the same photo.

Israeli spyware maker NSO channels Hollywood spy thrillers in appeal for legal immunity in WhatsApp battle

Israeli spyware maker NSO channels Hollywood spy thrillers in appeal for legal immunity in WhatsApp battle

Israeli spyware maker NSO Group has taken a leaf out of Hollywood in an attempt to avoid any legal repercussions from making and selling tools that hack WhatsApp users' phones.

Facial recognition designed to detect around face masks is failing, study finds

Facial recognition designed to detect around face masks is failing, study finds

Many facial recognition companies have claimed they can identify people with pinpoint accuracy even while they're wearing face masks, but the latest results from a study show that the coverings are dramatically increasing error rates.

You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

In a blog post, the company said an 'error' in its 'Tailored Audiences and Partner Audiences advertising system' inadvertently used the information provided by users for security reasons to run targeted ads based on the advertisers' own marketing lists.

Attorney General Barr’s dismissal of American privacy began long before the EARN It act

Attorney General Barr’s dismissal of American privacy began long before the EARN It act

However, FISA and the Comprehensive Antiterrorism Act of 1995 which he testified to, did allow for temporary warrantless surveillance (Sec. 308).Presently under the Trump administration, Barr has been pushing for explicit backdoor access into encryption technologies employed by companies such as Apple, Facebook, Google and secure messaging platforms including Signal, Telegram and Whatsapp.

GitHub - rllola/airbnb-scanner: Device scanner (simple ARP Ping) so you can scan for camera in your Airbnb!

GitHub - rllola/airbnb-scanner: Device scanner (simple ARP Ping) so you can scan for camera in your Airbnb!

Python app that scan for cameras.$ virtualenv venv -p $(which python3.7) --always-copy $ source venv\bin\activate.$ pip install -r .Scapy root privileges needed.Error :._ctypes.c:107:10: fatal error: ffi.h: No such file or directory.sudo apt install libffi-dev.

Refusing to unlock your phone? Jail. UK judge sentences activist under TERRORISM law

Refusing to unlock your phone? Jail. UK judge sentences activist under TERRORISM law

The leader of the anti-immigrant group Britain First was fined and given a suspended sentence for refusing to unlock his phone and computer to police after returning from a trip to Russia last year, under UK anti-terrorism laws.

Teen Hacker and Crew of ‘Evil Geniuses’ Accused of $24 Million Crypto Theft

Teen Hacker and Crew of ‘Evil Geniuses’ Accused of $24 Million Crypto Theft

(Bloomberg) -- An adviser to blockchain companies is claiming a 15-year-old and his crew of “evil computer geniuses” stole $24 million in cryptocurrency from him by hacking into his phone.A lawyer who represented Pinsky didn’t immediately respond to email and phone message.

Israel to use ‘anti-terrorism’ tech to monitor infected citizens, as Netanyahu declares ‘war’ on coronavirus

Israel to use ‘anti-terrorism’ tech to monitor infected citizens, as Netanyahu declares ‘war’ on coronavirus

While touting measures to protect Israelis from the coronavirus, Netanyahu did not touch on what the Jewish state is planning to do to stop the spread of the disease in the Palestinian territories it occupies and effectively controls.“Not a single word about Israel’s actions to protect millions of Palestinians living under Israeli military occupation,” ACLU Human Rights Program Director Jamil Dakwar tweeted.

Britain First leader Paul Golding charged under the Terrorism Act

Britain First leader Paul Golding charged under the Terrorism Act

The leader of far-right political group Britain First has been charged with an offence under the Terrorism Act after refusing to give police access to his phone.Golding was later charged with refusing to comply with a duty under Schedule 7 of the act.

US military's 'Jetson' laser can ID your unique heartbeat hundreds of feet away

US military's 'Jetson' laser can ID your unique heartbeat hundreds of feet away

And unlike some types of identification techniques that rely on biometrics (unique anatomical or behavioral traits), the subjects of Jetson's heartbeat-detecting infrared laser can be far away from the scanner.

Modi's Thought Control Firewall in Kashmir May Be the Internet's Future in India

Modi's Thought Control Firewall in Kashmir May Be the Internet's Future in India

On January 18, the government issued a new order relaxing the ban a teeny-weeny bit by allowing people in two districts of the Valley to access a limited number of “whitelisted” sites on post-paid mobile connections at 2G speed.

‘Couldn’t Sign You In’ — Google Denies Access to Several Linux Browsers

‘Couldn’t Sign You In’ — Google Denies Access to Several Linux Browsers

When users try to access the same site(s) in a major web browser, like Google Chrome or Mozilla Firefox, there is no error warning presented and the site loads without issue.

BleachBit 3.0

BleachBit 3.0

The latest release brings major improvements to the user interface, speed, cleaning thoroughness, and application reliability.Improve actual speed of application startup.(Thanks to Tobias-B-Besemer.)(Reported by Tobias-B-Besemer.)Add search="" to delete the top directory and all its contents.

Facebook admits app made to keep kids safe actually introduced them to adult strangers

Facebook admits app made to keep kids safe actually introduced them to adult strangers

"We are in regular contact with the FTC on many issues and products, including Messenger Kids," Facebook Vice President Kevin Martin wrote in a letter to two Democrats, which was reported by Reuters.

'Coding error' compromises passports, driver licences in Ministry of Culture and Heritage data breach

'Coding error' compromises passports, driver licences in Ministry of Culture and Heritage data breach

Manatū Taonga Ministry for Culture and Heritage chief executive Bernadette Cavanagh says more than 300 people who had applied to be part of the Tuia 250 sailings around the New Zealand coast have been affected by a digital privacy security breach.

What Is NXDOMAIN?

What Is NXDOMAIN?

When you search for a Web site (domain) that doesn’t exist, these ISPs will hijack your session (also called as Error Redirection service), and it will show suggestions for sites that are similar to what you entered with tons of advertisements.

HIPAA nightmare: An IT vendor’s error left more than 300,000 files with protected health information exposed

HIPAA nightmare: An IT vendor’s error left more than 300,000 files with protected health information exposed

Medico, Inc.’s IT vendor’s error left at least two Amazon buckets unsecured More than 300,000 files contained protected health information related to patient billing, complete with insurance information and treatment codes Leaks were independently discovered by at least three researchers using different search methods It’s been a rough few months in terms of business associates or third parties disclosing breaches of protected health information.

Victory: Somerville, Massachusetts Stands Up to Stop Face Surveillance

Victory: Somerville, Massachusetts Stands Up to Stop Face Surveillance

The city council of Somerville, Massachusetts voted unanimously last week to become the first city on the East Coast to ban government face surveillance. Massachusetts, tell your lawmakers: it’s time to hit the pause button on face surveillance.

China Is Forcing Tourists to Install Text-Stealing Malware at its Border

China Is Forcing Tourists to Install Text-Stealing Malware at its Border

Foreigners crossing certain Chinese borders into the Xinjiang region, where authorities are conducting a massive campaign of surveillance and oppression against the local Muslim population, are being forced to install a piece of malware on their phones that gives all of their text messages as well as other pieces of data to the authorities, a collaboration by Motherboard, Süddeutsche Zeitung, the Guardian , the New York Times , and the German public broadcaster NDR has found.

Upgrade Readiness deployment script

Upgrade Readiness deployment script

Error creating or updating registry key: CommercialId at HKLM:\SOFTWARE\Microsoft\Windows \CurrentVersion\Policies\DataCollection Verify that the context under which the script in running has access to the registry key. The SetupCommercialId function updates the Commercial Id at the registry key path: HKLM:\SOFTWARE\Microsoft\Windows \CurrentVersion\Policies\DataCollection Verify that the configuration script has access to this location.

Police should have cyber 'key' to unlock encrypted messages, senior officer says

Police should have cyber 'key' to unlock encrypted messages, senior officer says

Chief Constable Simon Bailey told the Independent Inquiry into Child Sexual Abuse (IISCA) yesterday he wanted tech giants to build a back door into apps, which he said were making it “so much harder” to catch paedophiles.

Detroit Police Used Cellphone Location Tracking Dozens Of Times In 2018

Detroit Police Used Cellphone Location Tracking Dozens Of Times In 2018

In October 2017, the Detroit Police Department (DPD) obtained a cell-site simulator, which is a type of surveillance technology that locates and tracks phones by mimicking cell phone towers.

The Feds Are Dropping Child Porn Cases Instead of Revealing Info on Their Surveillance Systems

The Feds Are Dropping Child Porn Cases Instead of Revealing Info on Their Surveillance Systems

The Department of Justice has been dismissing child pornography cases in order to not reveal information about the software programs used as the basis for the charges.

Finland to investigate Nokia-branded phones after data breach report

Finland to investigate Nokia-branded phones after data breach report

HELSINKI (Reuters) - Finland’s data protection ombudsman said on Thursday he would investigate whether Nokia-branded phones had breached data rules after a report said the handsets sent information to China.