New Coronavirus Stimulus Bill In Congress Creates U.S. Digital Dollar

New Coronavirus Stimulus Bill In Congress Creates U.S. Digital Dollar

Both Speaker Pelosi’s ‘Take Responsibility for Workers and Families Act’ and the ‘Financial Protections and Assistance for America’s Consumers, States, Businesses, and Vulnerable Populations Act (H.R. 6321),’ introduced by Chairwoman Maxine Waters of Financial Services Committee, introduced these concepts today as a way of delivering the economic stimulus payments to U.S. citizens.

La aplicación de autoevaluación de la Comunidad de Madrid para COVID-19: es oficial, da acceso a tus datos a empresas privadas y no los anonimiza

La aplicación de autoevaluación de la Comunidad de Madrid para COVID-19: es oficial, da acceso a tus datos a empresas privadas y no los anonimiza

Según el Aviso de Privacidad, las empresas participantes tienen acceso a los datos que damos a la aplicación, igual que las fuerzas y cuerpos de seguridad del estado.

WireGuide: All about the WireGuard VPN protocol

WireGuide: All about the WireGuard VPN protocol

WireGuard is a relatively new VPN protocol when compared with the decades old OpenVPN and approaches software development with a different philosophy – do one thing simple and do it well (efficiently).

Redditor Wins Fight to Stay Anonymous

Redditor Wins Fight to Stay Anonymous

The judge ordered disclosure of Darkspilver’s identity to Watch Tower’s lawyer, so the organization could try to shore up its legal claims.An opinion released Monday said, “The record establishes that Darkspilver made fair use of the Watch Tower ad and chart.

Do You Own Your Data?

Do You Own Your Data?

Discussion Questions: Since some entities (like corporations) do treat personal data as a commodity, for now, should we still demand that individuals be given a way to share in the distribution of the material benefits from the use/selling of such data?

‘Lack of privacy’: Nancy Pelosi warns NATO allies against using Huawei

‘Lack of privacy’: Nancy Pelosi warns NATO allies against using Huawei

Pelosi said the invasion of privacy that would result from having Huawei integrated into Europe’s 5G communication networks would be “like having the state police, the Chinese state police, right in your pocket.”.

Analysis: Dotcom Appeal Dismissed

Analysis: Dotcom Appeal Dismissed

The court ruled as follows: “[72] Having assessed the disputed communications, we find that GCSB’s claim that disclosure would harm national security and international relations is well-founded.

Suspect can’t be compelled to reveal “64-character” password, court rules

Suspect can’t be compelled to reveal “64-character” password, court rules

Writing for the majority in a ruling handed down on Wednesday, Justice Debra Todd wrote: Based upon these cases rendered by the United States Supreme Court regarding the scope of the Fifth Amendment, we conclude that compelling the disclosure of a password to a computer, that is, the act of production, is testimonial.

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

“Our team found a way of manipulating specific actions and intents,” Erez Yalon, director of security research at Checkmarx said, “making it possible for any application, without specific permissions, to control the Google Camera app.

‘Data Privacy’ Searches Skyrocket to All-Time Highs in the U.S.

‘Data Privacy’ Searches Skyrocket to All-Time Highs in the U.S.

‘Data Privacy’ Searches Skyrocket to All-Time Highs in the U.S. Interest in data privacy has skyrocketed to the highest level in history since data started being gathered in 2004.Google Trends’ levels represent the search interest relative to the highest point in a specific date range.

Victory! EFF Wins Access to License Plate Reader Data to Study How Law Enforcement Uses the Privacy Invasive Technology

Victory! EFF Wins Access to License Plate Reader Data to Study How Law Enforcement Uses the Privacy Invasive Technology

San Francisco—Electronic Frontier Foundation (EFF) and the American Civil Liberties Union Foundation of Southern California (ACLU SoCal) have reached an agreement with Los Angeles law enforcement agencies under which the police and sheriff’s departments will turn over license plate data they indiscriminately collected on millions of law-abiding drivers in Southern California.

How safe are school records? Not very, says student security researcher

How safe are school records? Not very, says student security researcher

Among one of the more damaging issues Demirkapi found in Follett’s student information system was an improper access control vulnerability, which if exploited could have allowed an attacker to read and write to the central Aspen database and obtain any student’s data.

Facebook funds AI mind-reading experiment

Facebook funds AI mind-reading experiment

"And by demonstrating a proof-of-concept using implanted electrodes as part of their effort to help patients with speech loss, we hope UCSF's work will inform our development of the decoding algorithms and technical specifications needed for a fully non-invasive, wearable device.

New York City bill could make selling phone location data illegal

New York City bill could make selling phone location data illegal

According to The New York Times, selling location data generates billions of dollars per year for telecommunication firms and mobile app companies. It's not guaranteed to pass, but the New York City bill could be the first in a trend of cities establishing their own location data rules.

Zoom Zero Day: 4+ Million Webcams & maybe an RCE? Just get them to visit your website!

Zoom Zero Day: 4+ Million Webcams & maybe an RCE? Just get them to visit your website!

On June 24th after 90 days of waiting, the last day before the public disclosure deadline, I discovered that Zoom had only implemented the ‘quick fix’ solution originally suggested.

Microsoft: The open source company

Microsoft: The open source company

Stallman, who liked to be called by his initials, RMS, in tribute to the way he logged on to the computer, used the Hacker Ethic as a guiding principle for his best-known work, an editing program called EMACS which allowed users to limitlessly customize it its wide-open architecture encouraged people to add to it, improve it endlessly.

Reddit Commenter's Fight for Anonynmity Is a Win for Free Speech and Fair Use

Reddit Commenter's Fight for Anonynmity Is a Win for Free Speech and Fair Use

Accordingly, Watch Tower’s subpoena could not pass the well-established “Doe” test, which allows a party to use the courts to pierce anonymity only where they can show that their claims are valid and also that the balance of harms favors disclosure.

Detroit Police Used Cellphone Location Tracking Dozens Of Times In 2018

Detroit Police Used Cellphone Location Tracking Dozens Of Times In 2018

In October 2017, the Detroit Police Department (DPD) obtained a cell-site simulator, which is a type of surveillance technology that locates and tracks phones by mimicking cell phone towers.

The Challenges of Ethical Hacking – A Minefield of Legal and Ethical Woes

The Challenges of Ethical Hacking – A Minefield of Legal and Ethical Woes

Depending on the organization that you’re dealing with, responses can be as positive as interested engagement and proactively fixing an issue, to dismissive and uninterested, to actively hostile and ready to pursue legal action.

“Ethics” and Ethics

“Ethics” and Ethics

How should they even understand design ethics when there’s a user research department, an analytics group and, UX team each with a different focus? Philosophical ethics discusses the morality of human action, it doesn’t provide rules to program self-driving cars.

Pentagon Says All of Google’s Work on Drones Is Exempt From the Freedom of Information Act

Pentagon Says All of Google’s Work on Drones Is Exempt From the Freedom of Information Act

According to a Pentagon memo signed last year, however, no one at Google needed worry: All 5,000 pages of documents about Google’s work on the drone effort, known as Project Maven, are barred from public disclosure, because they constitute “critical infrastructure security information.”.

Data Breaches

Data Breaches

Stationary Device (STAT) Stationary computer loss (lost, inappropriately accessed, discarded or stolen computer or server not designed for mobility) Unintended Disclosure (DISC) Unintended disclosure (not involving hacking, intentional breach or physical loss – for example: sensitive information posted publicly, mishandled or sent to the wrong party via publishing online, sending in an email, sending in a mailing or sending via fax) Unknown

Amazon’s Antitrust Antagonist Has a Breakthrough Idea

Amazon’s Antitrust Antagonist Has a Breakthrough Idea

Once-robust monopoly laws have been marginalized, Ms. Khan wrote, and consequently Amazon is amassing structural power that lets it exert increasing control over many parts of the economy.

Differential privacy, an easy case

Differential privacy, an easy case

However, as long as we know the precise fraction of the spinner that is light, we can use the randomized responses to estimate something about our group of respondents, like the fraction of people who actually answered “Yes” to the original question.

#1: You Don’t Own Your Identity — The Digital Identity Podcast

#1: You Don’t Own Your Identity — The Digital Identity Podcast

We are delighted to present the first episode of our Digital Identity Podcast: You Don’t Own Your Identity . This podcast aims to steer you through those murky waters by providing insight into how personal information is managed and how we can provide a better alternative.

617 million stolen records up for sale on dark web

617 million stolen records up for sale on dark web

The Register says the number of accounts from the following websites are for sale on the dark web: “The biggest risk of targeted individual attacks against the victims, however, is probably already in the past: now the buyers will likely conduct large-scale phishing and malware campaigns without a high degree of sophistication,” predicts Kolochenko.

Parenting site Mumsnet hit by data breach

Parenting site Mumsnet hit by data breach

These are external links and will open in a new window These are external links and will open in a new window Image copyright Mumsnet Image caption Mumsnet founder Justine Roberts posted a lengthy explanation about the breach Parenting site Mumsnet has reported itself to the UK's data protection watchdog after an upgrade let some people see details of other accounts.

Thousands of industrial refrigerators can be remotely defrosted, thanks to default passwords

Thousands of industrial refrigerators can be remotely defrosted, thanks to default passwords

More than 7,000 vulnerable temperature controlled systems , manufactured by U.K.-based firm Resource Data Management, are accessible from the internet and can be controlled by simply plugging in its default password found in documentation on the company’s website, according to Noam Rotem, one of the security researchers who found the vulnerable systems.

LibreOffice patches malicious code-execution bug, Apache OpenOffice – wait for it, wait for it – doesn't

LibreOffice patches malicious code-execution bug, Apache OpenOffice – wait for it, wait for it – doesn't

After trying various approaches to exploit the vulnerability, Inführ found that he could rig the event to call a specific function within a Python file included with the Python interpreter that ships with LibreOffice.

Canadian Privacy Laws: A Primer

Canadian Privacy Laws: A Primer

The Act also applies to the Government’s collection, use and disclosure of personal information in the course of providing services.”[1] Personal Information Protection and Electronic Documents Act (the “PIPEDA“) and Provincial Privacy Acts: The PIPEDA and Provincial Privacy Acts set out “the ground rules for how private-sector organizations collect, use, and disclose personal information in the course of for-profit, commercial activities across Canada.