Google Warns LastPass Users Were Exposed To ‘Last Password’ Credential Leak

Google Warns LastPass Users Were Exposed To ‘Last Password’ Credential Leak

Project Zero has just disclosed that a security vulnerability left some of those 16 million users exposed to the risk of credential compromise as, in an ironic twist, LastPass could leak the last password used to any website visited.

Amazon Requires Police to Shill Surveillance Cameras in Secret Agreement

Amazon Requires Police to Shill Surveillance Cameras in Secret Agreement

Ring donated 15 free doorbell surveillance cameras to the Lakeland Police Department, and created a program to encourage people to download its “neighborhood watch” app, Neighbors.

Confirmed: 2 Billion Records Exposed In Massive Smart Home Device Breach

Confirmed: 2 Billion Records Exposed In Massive Smart Home Device Breach

The researchers in question, Noam Rotem and Ran Locar from vpnMentor, found that a user database belonging to a Chinese company called Orvibo, which runs an Internet of Things (IoT) management platform, had been left exposed to the Internet without any password to protect it.

MongoDB 4.2 Introduces End-to-End Field Level Encryption for Databases

MongoDB 4.2 Introduces End-to-End Field Level Encryption for Databases

The newly introduced Field Level Encryption (FLE), which will be available in the upcoming MongoDB 4.2 release, is an end-to-end encryption feature that encrypts and decrypts sensitive users' data on the client-side, preventing hackers from accessing plaintext data even if the database instance left exposed online or the server itself gets compromised.

Apple is making corporate ‘BYOD’ programs less invasive to user privacy

Apple is making corporate ‘BYOD’ programs less invasive to user privacy

This new MDM (mobile device management) enrollment option is meant to better balance the needs of IT to protect sensitive corporate data and manage the software and settings available to users, while at the same time allowing users’ private personal data to remain separate from IT oversight.

Fast ways to increase online privacy

Fast ways to increase online privacy

And while it’s difficult to follow the research on what methods are the best for private, secure messaging, there are some basic principles that, when followed, keep you safer than not. The most basic quality of a secure chat is one that is end-to-end encrypted.

Microsoft Confirms Intent To Replace Windows 10 Passwords For 800 Million Users

Microsoft Confirms Intent To Replace Windows 10 Passwords For 800 Million Users

Microsoft's crypto, identity and authentication team group manager, Yogesh Mehta, has made an announcement that he says puts "the 800 million people who use Windows 10 one step closer to a world without passwords."

China's People Monitoring Software Being Deployed In Darwin

China's People Monitoring Software Being Deployed In Darwin

With the city's desire to use data from WiFi networks commercially and, potentially, other purposes, it reinforces my view that there is no safe public WiFi if you value privacy.

Brooklyn Apartment Tenants Rise Up Against Landlord’s Plans to Install Facial Recognition Technology

Brooklyn Apartment Tenants Rise Up Against Landlord’s Plans to Install Facial Recognition Technology

The landlord, Nelson Management Group, filed an application to install the tech with New York State Homes & Community Renewal (NYSHCR)—which can approve or deny the request. This is the first time a property manager filed an application for facial recognition technology with NYSHCR according to The Brooklyn Eagle.

Researchers warn of serious password manager flaws

Researchers warn of serious password manager flaws

'Although password managers provide some utility for storing login/passwords and limit password reuse, these applications are a vulnerable target for the mass collection of this data through malicious hacking campaigns.' ISE researchers concentrated their efforts on four of the most popular password management services around: 1Password, in both legacy and current forms, Dashlane, KeePass, and LastPass.

Password Managers: Under the Hood of Secrets Management

Password Managers: Under the Hood of Secrets Management

However, while KeePass attempts to keep secrets secure by scrubbing them from memory, there are obviously errors in these workflows as we have discovered that while even in a locked state, we were able to extract entries that had been interacted with.

Checksum checking server

Checksum checking server

It is also usable in west countries because with cooperation of telecom companies software publisher can know if a IT company is downloading or ordinary user which cannot detect an unknown spyware this system can also be P2P but without a fully decentralized protocol it doesn't make any effect in being lobby-proof.

Opinion | Warning! Everything Is Going Deep: ‘The Age of Surveillance Capitalism’

Opinion | Warning! Everything Is Going Deep: ‘The Age of Surveillance Capitalism’

The Times’s Kevin Roose quoted Mohit Joshi, the president of Infosys, a technology firm that helps other businesses automate their operations, as saying in Davos last week: “People are looking to achieve very big numbers.

SBI Investigates Reported Massive Data Leak

SBI Investigates Reported Massive Data Leak

See Also: Key Drivers to Enable Digital Transformation in Financial Services The government-owned bank, which has 740 million active accounts, neglected to password-protect one of its servers based in a Mumbai data center, enabling easy access to customer data, TechCrunch reports.

After years of unrelenting privacy scandals, Facebook hires 3 of its fiercest critics

After years of unrelenting privacy scandals, Facebook hires 3 of its fiercest critics

Greene responded to the Cambridge Analytica scandal by saying “Facebook basically pimped out its users,” arguing that the company covered up “corporate malfeasance.” Greene joins Facebook’s privacy policy team as a manager on law enforcement access and data protection issues.

What if Facebook was a brick and mortar company

What if Facebook was a brick and mortar company

This only comes to about 50 people so to avoid looking like a loner in front of Darren you start listing people who aren't really friends but rather people you know.

773 million email addresses exposed in ‘mega data breach’ — here’s how to see if yours is one of them

773 million email addresses exposed in ‘mega data breach’ — here’s how to see if yours is one of them

“While it’s important that individual web users have strong, secure logins, the onus is on the businesses to detect and block malicious bot traffic before large-scale password hacks can occur.” The breach is yet another reminder that the best way to protect your privacy is to use a password manager and two-factor authentication, said Bill Evans, a vice president at California security firm One Identity.

An Astonishing 773 Million Records Exposed in Monster Breach

An Astonishing 773 Million Records Exposed in Monster Breach

The data set was first reported by security researcher Troy Hunt , who maintains Have I Been Pwned , a way to search whether your own email or password has been compromised by a breach at any point.

Remote Work Security Guide

Remote Work Security Guide

Today we want to share our knowledge on how to build a remote team and especially – how we manage remote work security. Especially important in remote work security, and in general, is to make sure that the emails your team is receiving are from a trustworthy source.

Google wants to spy on everything you do at home, in every room (including the bathroom), to help “improve” your family

Google wants to spy on everything you do at home, in every room (including the bathroom), to help “improve” your family

Today’s “smart speakers” monitor and analyze only sounds, while Google’s futuristic automation system wants to measure everything: “acceleration, temperature, humidity, water, supplied power, proximity, external motion, device motion, sound signals, ultrasound signals, light signals, fire, smoke, carbon monoxide or other gas, global-positioning-satellite (GPS) signals, radio-frequency (RF), other electromagnetic signals or fields, or the like.” The patent helpfully walks us through various applications of all this technology.

Chinese schools enforce 'smart uniforms' with GPS tracking system to monitor students

Chinese schools enforce 'smart uniforms' with GPS tracking system to monitor students

Chinese schools enforce 'smart uniforms' with GPS tracking system to monitor students Updated Photo: Facial recognition ensures that each uniform is worn by its rightful owner.

I Visited Facebook’s 'Privacy Shop' And They Still Don’t Get It

I Visited Facebook’s 'Privacy Shop' And They Still Don’t Get It

Credit: Tom's GuideFacebook’s reputation on that front has been less than stellar throughout the past year, and the shop is clearly an effort to change that image and regain the public’s trust.

Why you should use a password manager

Why you should use a password manager

When you use a password to log into a website, the password manager will store that information so you can log in automatically the next time. All other passwords of different accounts will be remembered by the manager.

How smartphone apps track users and share data

How smartphone apps track users and share data

Researchers at Oxford university analysed approximately a third of the apps available in Google’s Play Store in 2017 and found that the median app could transfer data to 10 third parties, with one in five apps able to share data with more than 20.

The Employer-Surveillance State

The Employer-Surveillance State

Michel Anteby, a Boston University sociologist and business scholar who has watched how monitoring affects employees at the TSA and other workplaces, has also noticed that the more employees are watched, the harder they try to avoid being watched, and the harder management tries to watch them.

Making The Grade: It’s hypocritical for Apple to promote privacy while not offering a G-Suite alternative

Making The Grade: It’s hypocritical for Apple to promote privacy while not offering a G-Suite alternative

I’ll make a statement that might be unpopular: Apple shouldn’t promote their privacy stance to schools when they aren’t offering a compelling service that schools can sign up for that replaces G-Suite. iCloud for Work could include hosted email, calendars, and contacts for businesses and schools.

Facebook to release first-party cookie option for ads, pull web analytics from Safari

Facebook to release first-party cookie option for ads, pull web analytics from Safari

The company is releasing a new first-party cookie option for advertisers, publishers, and developers to measure and optimize Facebook ads and capture analytics data from browsers that block third-party cookies — namely Apple’s Safari and soon Mozilla’s Firefox.

A Seemingly Small Change to Chrome Stirs Big Controversy

A Seemingly Small Change to Chrome Stirs Big Controversy

For privacy-conscious users who don't want to be signed into Chrome in any way and risk another policy change that exposes more of their data, the best option for continuing to use Chrome seems to be using a secondary browser for your Gmail and other Google services.

Privacy: Yahoo still scans your emails... and wants to sell data to advertisers

Privacy: Yahoo still scans your emails... and wants to sell data to advertisers

Oath -- the owner of Yahoo -- is in talks with advertisers, promoting a service that scans the content of emails and provides a wealth of information about users.