US joins six countries in new call for backdoor encryption access

US joins six countries in new call for backdoor encryption access

On Monday, the US Department of Justice signed on to a new international statement warning of the dangers of encryption and calling for an industry-wide effort to enable law enforcement agencies to access encrypted data once a warrant has been obtained.

Inside the NBA's plan to use smart technology and big data to keep players safe from coronavirus

Inside the NBA's plan to use smart technology and big data to keep players safe from coronavirus

According to the NBA's health and safety memo for the restart of the season, which was obtained by CNBC, residents will receive a "smart" ring, a Disney MagicBand, individual pulse oximeter and a smart thermometer to help monitor and reduce the spread of the coronavirus.

Amazon to use AI tech in its warehouses to enforce social distancing

Amazon to use AI tech in its warehouses to enforce social distancing

(Reuters) - Inc (AMZN.O) on Tuesday launched an artificial intelligence-based tracking system to enforce social distancing at its offices and warehouses to help reduce any risk of contracting the new coronavirus among its workers.

DEA Can Secretly Surveil George Floyd Protesters

DEA Can Secretly Surveil George Floyd Protesters

The Drug Enforcement Administration has been granted sweeping new authority to “conduct covert surveillance” and collect intelligence on people participating in protests over the police killing of George Floyd, according to a two-page memorandum obtained by BuzzFeed News.

Acting Intelligence Chief says he's "increasingly concerned" over handling of sensitive U.S. person information among agencies and orders broad review

Acting Intelligence Chief says he's "increasingly concerned" over handling of sensitive U.S. person information among agencies and orders broad review

But Grenell wrote, "As the Acting Director of National Intelligence, I serve as the approving official for dissemination of unmasked congressional identity information...I have become increasingly concerned with intelligence reports that inconsistently apply the policies and procedures governing how U.S. person identities are masked.".

Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more

Why should the UK pensions watchdog be able to spy on your internet activities? Same reason as the Environment Agency and many more

In a memorandum [PDF] first spotted by The Guardian, the British government is asking that five more public authorities be added to the list of bodies that can access data scooped up under the nation's mass-surveillance laws: the Civil Nuclear Constabulary, the Environment Agency, the Insolvency Service, the UK National Authority for Counter Eavesdropping (UKNACE), and the Pensions Regulator.

Qubes Architecture Next Steps: The GUI Domain

Qubes Architecture Next Steps: The GUI Domain

There were two big issues in the previous Qubes architecture that needed to be handled for an effective approach to a GUI domain: how the GUI protocol relied on dom0-level privileges and how managing anything in the system required dom0-level access to the hypervisor.

US to start collecting DNA from people detained at border

US to start collecting DNA from people detained at border

A memo outlining the program published Monday by the Department of Homeland Security said U.S. citizens and permanent residents holding a “green card” who are detained could be subject to DNA testing, as well as asylum seekers and people entering the country without authorization.

Pentagon warns US military not to use home DNA testing kits

Pentagon warns US military not to use home DNA testing kits

The Pentagon is advising members of the US military not to use DNA testing kits, warning that the popular genetic identification kits could pose a security risk.But a department of defence memo, obtained by Yahoo News, warned that the kits could put members of the military at risk.

New Intel CPU Vulnerability Puts Protected Data At Risk

New Intel CPU Vulnerability Puts Protected Data At Risk

Intel CPUs are at the center of controversy once again as yet another vulnerability is discovered by Cybersecurity researchers.According to their findings, the security vulnerability can compromise SGX (software guard extensions) protected by undervolting the CPU when executing protected computations, to the degree that the SGX memory encryption failed to protect data.

Librem 13 – Purism

Librem 13 – Purism

The Librem 13 is the first ultra-portable laptop for the security-conscious road warrior—designed chip-by-chip, line-by-line, to respect your rights to privacy, security, and freedom.When you use a Purism computer you know you are operating the best hardware and software, while keeping your rights to privacy, security, and freedom in mind.

Snowden will make first major appearance since U.S. lawsuit at conference next month

Snowden will make first major appearance since U.S. lawsuit at conference next month

NEW YORK (Reuters) - Fugitive U.S. intelligence whistleblower Edward Snowden will speak next month by video at Web Summit in Lisbon, billed by the organizers as the world’s largest annual tech conference.

Feds Sue Edward Snowden, Move to Seize Book Proceeds

Feds Sue Edward Snowden, Move to Seize Book Proceeds

"The United States' ability to protect sensitive national security information depends on employees' and contractors' compliance with their non-disclosure agreements, including their pre-publication review obligations," said US assistant attorney general Jody Hunt in a statement.

Weakness in Intel chips lets researchers steal encrypted SSH keystrokes

Weakness in Intel chips lets researchers steal encrypted SSH keystrokes

Now, researchers are warning that, in certain scenarios, attackers can abuse DDIO to obtain keystrokes and possibly other types of sensitive data that flow through the memory of vulnerable servers.

The Neuroscientist Who's Building a Better Memory for Humans

The Neuroscientist Who's Building a Better Memory for Humans

Later, when Berger gave the memory task rats a drug that blocks memory formation, he used his device to electrically stimulate the brain with the pattern of pulses—the outgoing space-time code—predicted by his model.

An electronic chip that makes ‘memories’ is a step towards creating bionic brains

An electronic chip that makes ‘memories’ is a step towards creating bionic brains

Our new electronic chip uses light to create and modify memories, moving us closer towards artificial intelligence (AI) that can replicate the human brain’s sophistication. This enables it to mimic the way neurons work to store and delete information in the brain.

Memory Industry

Memory Industry

If you choose to make your Vid public and it includes the auto-generated memory for a particular brand, then that brand will have the opportunity to add a swipe-up link to that memory, provided the user has chosen to monetize it.

JavaScript tells all, which turns out not to be so great for privacy: Side-channel leaks can be exploited to follow you around the interweb

JavaScript tells all, which turns out not to be so great for privacy: Side-channel leaks can be exploited to follow you around the interweb

Boffins from Graz University of Technology in Austria have devised an automated system for browser profiling using two new side channel attacks that can help expose information about software and hardware to fingerprint browsers and improve the effectiveness of exploits.

New Intel CPU Flaws Expose VMs and Clouds to Full Takeover – Introducing RIDL, ZombieLoad and Fallout

New Intel CPU Flaws Expose VMs and Clouds to Full Takeover – Introducing RIDL, ZombieLoad and Fallout

While existing attacks target information at specific addresses, RIDL operates akin to a passive sniffer that eavesdrops on in-flight data (e.g., data in the line fill buffers) flowing through CPU components.

GrapheneOS is an Android-based, security-hardened, open source operating system

GrapheneOS is an Android-based, security-hardened, open source operating system

It’s called GrapheneOS, and it comes from Daniel Micay, the former lead developer of another security-based Android fork called CopperheadOS. Since it’s an open source project, independent developers may be able to port the operating system to run on additional devices.

GitHub - rek7/mXtract: mXtract - Memory Extractor & Analyzer

GitHub - rek7/mXtract: mXtract - Memory Extractor & Analyzer

It is developed as an offensive pentration testing tool, which is used to scan memory for private keys, ips, and passwords using regexes. Scan with verbose and with a simple IP regex, scanning only heap and stack.

Federal agency looking at fitness trackers for public sector workers

Federal agency looking at fitness trackers for public sector workers

"Interactive insurance policies give consumers the opportunity to receive discounts on premiums for sharing health-related information through wearable tracking devices," says the memo.

Warning over 'high severity' security flaw in Google's Chrome web browser being exploited in the wild

Warning over 'high severity' security flaw in Google's Chrome web browser being exploited in the wild

Users of Google's Chrome web browser have been advised to update it as a matter of urgency following the discovery of exploits in the wild for a ‘high severity' security flaw publicised in February.

Google Project Zero team reveals ‘high severity’ flaw in macOS kernel, working w/ Apple on a patch

Google Project Zero team reveals ‘high severity’ flaw in macOS kernel, working w/ Apple on a patch

Most recently, the team at Google has reported and publicly disclosed a “high severity” flaw in the macOS kernel which can grant an attacker access to a users computer without their knowledge.

Facebook asked George Osborne to influence EU data protection law

Facebook asked George Osborne to influence EU data protection law

When former chancellor of the exchequer George Osborne revealed his 11-year-old was “desperate to have a Facebook account”, he was invited to bring them to visit the firm's office The memo records Sandberg’s meeting with Osborne, as documented by Marne Levine, then Facebook’s vice-president of global public policy.

Revealed: Facebook’s global lobbying against data privacy laws

Revealed: Facebook’s global lobbying against data privacy laws

Facebook has targeted politicians around the world – including the former chancellor, George Osborne – promising investments and incentives while seeking to pressure them into lobbying on Facebook’s behalf against data privacy legislation, an explosive new leak of internal documents has revealed.

KeePassXC Memory Security

KeePassXC Memory Security

Linux Memory Protection KeePassXC prevents the use of ptrace and generation of core dumps. The above memory protection techniques are all applied during the initial Bootstrap process before any data is loaded in to the application.

Password Managers: Under the Hood of Secrets Management

Password Managers: Under the Hood of Secrets Management

However, while KeePass attempts to keep secrets secure by scrubbing them from memory, there are obviously errors in these workflows as we have discovered that while even in a locked state, we were able to extract entries that had been interacted with.

70 percent say government spies on social media, 35 percent cover computer camera to hide

70 percent say government spies on social media, 35 percent cover computer camera to hide

In a new survey for Security.org, over 70 percent said that Uncle Sam is spying on the social media, Internet browsing and phone calls of Americans.

Facebook Data Scandals Stoke Criticism That a Privacy Watchdog Too Rarely Bites

Facebook Data Scandals Stoke Criticism That a Privacy Watchdog Too Rarely Bites

Last spring, soon after Facebook acknowledged that the data of tens of millions of its users had improperly been obtained by the political consulting firm Cambridge Analytica, a top enforcement official at the Federal Trade Commission drafted a memo about the prospect of disciplining the social network.