There's a privacy bracelet that jams smart speakers and, hell yeah, bring it

There's a privacy bracelet that jams smart speakers and, hell yeah, bring it

What's more, the study authors note that because of the way people tend to "speak" with their hands while speaking with their actual mouths, the wearable jammer is extra effective at blocking hidden microphones at is moves around.

Watching you watch: the tracking system of over-the-top TV streaming devices

Watching you watch: the tracking system of over-the-top TV streaming devices

Our measurements showed that tracking is prevalent on the OTT platforms we studied, with traffic to known trackers present on 69% of Roku channels and 89% of Amazon Fire TV channels.

Exclusive: Europe wants single data market to break U.S. tech giants' dominance

Exclusive: Europe wants single data market to break U.S. tech giants' dominance

The proposal, which includes reining in big online platforms and could still be tweaked ahead of their presentation on Feb. 19, underlines the EU’s determination to break U.S. tech giants’ stranglehold on vast troves of data and better compete with Chinese rivals.

Location-tracking database of 12M phones may include you

Location-tracking database of 12M phones may include you

Anyone who has ever granted a third-party app access to Location Services could be in a location-tracking database of 12 million phones, says a new report today.

Researchers hack Siri, Alexa, and Google Home by shining lasers at them

Researchers hack Siri, Alexa, and Google Home by shining lasers at them

While the researchers tested only Siri, Alexa, Google Assistant, Facebook Portal, and a small number of tablets and phones, the researchers believe all devices that use MEMS microphones are susceptible to Light Commands attacks.

Sberbank Hit by Huge Data Breach

Sberbank Hit by Huge Data Breach

The personal details of millions of Sberbank customers may have been leaked, in what would be the largest-ever data breach in Russian banking, according to cyber security experts.Analysts at cybersecurity firm DeviceLock found personal information relating to up to 60 million Sberbank credit card holders for sale on the black market.

‘Ignorance is not an excuse’: California draft rules on data privacy released

‘Ignorance is not an excuse’: California draft rules on data privacy released

California Attorney General Xavier Becerra released a series of draft regulations Thursday aimed at getting businesses to comply with the state’s landmark data privacy law, scheduled to take effect Jan. 1.

Carnegie Experts Should Know: Defending Encryption Isn't an "Absolutist" Position

Carnegie Experts Should Know: Defending Encryption Isn't an "Absolutist" Position

Unfortunately, the report begins with the premise that the “problem” to be solved is that law enforcement agencies sometimes can’t access encrypted devices, then suggests those who disagree with the premise hold “absolutist” positions.

Now is the time to defend the final haven for privacy: your brain

Now is the time to defend the final haven for privacy: your brain

Glyn Moody is a freelance journalist who writes and speaks about privacy, surveillance, digital rights, open source, copyright, patents and general policy issues involving digital technology.

MIT Invented a Camera That Can Read Closed Books

MIT Invented a Camera That Can Read Closed Books

In a breakthrough that will appeal to both spies and those who work with priceless but frail historical documents, researchers at MIT have developed a camera that uses terahertz radiation to peer at the text on pages of a book, without it having to be open.

Home Affairs pushes for cyber spy powers

Home Affairs pushes for cyber spy powers

The Department of Home Affairs is pushing ahead with moves to expand the powers of Australia’s cyber spy agency, the Australian Signals Directorate, to potentially embed ASD within the corporate computer systems that run the nation’s banks, telecommunications and other critical infrastructure.

A Feisty Google Adversary Tests How Much People Care About Privacy

A Feisty Google Adversary Tests How Much People Care About Privacy

Started over a decade ago, DuckDuckGo offers a privacy-focused alternative to Google’s search engine. It has also made a profit in each of the last five years, Mr. Weinberg said.

If you did the Mannequin Challenge, you are now advancing robotics research

If you did the Mannequin Challenge, you are now advancing robotics research

The data: To approach this problem, a team at Google AI turned to an unexpected data set: thousands of YouTube videos of people performing the Mannequin Challenge. The method: The researchers converted 2,000 of the videos into 2D images with high-resolution depth data and used them to train a neural network.

Security and privacy key to smart buildings and cities

Security and privacy key to smart buildings and cities

At the core of the security problem is the fact that many of the systems that smart building and cities will need to rely on will be linked to a wide variety of internet of things-connected (IoT) devices and sensors that are potentially vulnerable to cyber attacks.

Facebook Libra: Great Message, Wrong Messenger

Facebook Libra: Great Message, Wrong Messenger

Depending on what you read or hear, Libra is one or all of: a great act of enterprise social good that will change the lives of millions of people for the better; a nightmare for American and European regulators; a desperate attempt to rehabilitate the reputation and declining readership of Facebook and its increasingly unpopular CEO, Mark Zuckerberg; or a pipedream based on a shaky premise and a yet-to-be-built infrastructure that probably won’t be built.

It's Getting Way Too Easy to Create Fake Videos of People's Faces

It's Getting Way Too Easy to Create Fake Videos of People's Faces

Researchers at the Samsung AI Center in Moscow developed a way to create "living portraits" from a very small dataset—as few as one photograph, in some of their models. The researchers call this few- and one-shot learning, where the model can be trained using just one image to create a convincing, animated portrait.

Beyond 5G: Huawei's Links To Xinjiang And China's Surveillance State

Beyond 5G: Huawei's Links To Xinjiang And China's Surveillance State

"Under President Xi Jinping," the New York Times said this week, "the Chinese government has vastly expanded domestic surveillance, fueling a new generation of companies that make sophisticated technology at ever lower prices.

Engineers Develop Ingenious Method to Defeat AI Surveillance... With a Color Printout

Engineers Develop Ingenious Method to Defeat AI Surveillance... With a Color Printout

Suffice it to say, we were quite pleased when we learned that engineers from the University of KU Leuven (Belgium) developed a way – specifically, an adversarial attack – to effectively disrupt object detection AI powered by the YOLOv2 algorithm.

An Internet for Kids

An Internet for Kids

Two thirds of 12–15 year olds who use social media or messaging sites say they send support messages, comments or posts to friends if they are having a difficult time.

E-readers reading your reading: A serious invasion of privacy?

E-readers reading your reading: A serious invasion of privacy?

I feel there are bigger things to worry about than whether Kobo knows what page of Fifty Shades (no, not really) I'm currently on, or if the Amazon lot are astonished to see that not only has my husband got all the paper editions of the George RR Martin books, but he's just bought them all as ebooks as well as they were "too heavy to carry to work".

Defense against the Darknet, or how to accessorize to defeat video surveillance

Defense against the Darknet, or how to accessorize to defeat video surveillance

"The idea behind this work is to be able to circumvent security systems that use a person detector to generate an alarm when a person enters the view of a camera," explained Wiebe Van Ranst, a PhD researcher at KU Leuven, in an email to The Register .

Facebook is partnering with a big UK newspaper to publish sponsored articles downplaying 'technofears' and praising the company

Facebook is partnering with a big UK newspaper to publish sponsored articles downplaying 'technofears' and praising the company

Facebook has partnered with The Daily Telegraph, a broadsheet British newspaper, to run a series of features about the company, Business Insider has found – including stories that defend it on hot-button issues it has been criticised over like terrorist content, online safety, cyberbullying, fake accounts, and hate speech.

Saudis gained access to Amazon CEO Bezos' phone: Bezos' security chief

Saudis gained access to Amazon CEO Bezos' phone: Bezos' security chief

WASHINGTON (Reuters) - The security chief for Amazon chief executive Jeff Bezos said on Saturday that the Saudi government had access to Bezos’ phone and gained private information from it.

Robots Vs Robocalls

Robots Vs Robocalls

AI-backed text-to-speech technology applied to sales solicitation enables the robocall to simulate a back-and-forth conversation and make real-time adjustments to follow-up questions based on keywords, context, etc., making human-robot differentiation more difficult.

Can a VPN keep you safe from 36 new 4G LTE security vulnerabilities?

Can a VPN keep you safe from 36 new 4G LTE security vulnerabilities?

A team of four researchers from South Korea’s KAIST, the country’s premier tech institution, have discovered 36 new vulnerabilities in 4G LTE that have wide ranging security and privacy implications.

Amazon’s Antitrust Antagonist Has a Breakthrough Idea

Amazon’s Antitrust Antagonist Has a Breakthrough Idea

Once-robust monopoly laws have been marginalized, Ms. Khan wrote, and consequently Amazon is amassing structural power that lets it exert increasing control over many parts of the economy.

Artificial intelligence senses people through walls

Artificial intelligence senses people through walls

The researchers use a neural network to analyze radio signals that bounce off people’s bodies, and can then create a dynamic stick figure that walks, stops, sits, and moves its limbs as the person performs those actions.

From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic

From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic

"These unintentional microphones sense speech with high enough fidelity for the Shazam service to recognize a song recorded through the hard drive." The team's research work, scheduled to be presented in May at the 2019 IEEE Symposium on Security and Privacy , explores how it's possible to alter HDD firmware to measure the offset of a disk drive's read/write head from the center of the track it's seeking.

Flaws in 4G and 5G can lead to spying on location and calls, researchers find

Flaws in 4G and 5G can lead to spying on location and calls, researchers find

Attack works by making several calls In the paper, the researchers outline an attack called Torpedo, which can be used to determine whether a device is in a certain location. The attack exploits an issue in how devices send “paging” information when calls or texts are received.

Profs prep promising privacy-protecting proxy program... Yes, it is possible to build client-server code that safeguards personal info

Profs prep promising privacy-protecting proxy program... Yes, it is possible to build client-server code that safeguards personal info

In a paper scheduled to be presented on Thursday at the USENIX Networked Systems Design and Implementation conference , co-authors Frank Wang (MIT), Ronny Ko and James Mickens (Harvard) describe a system called Riverbed – not to be confused with an identically named IT company – that consists of a proxy service to oversee the handling of data locally and on remote servers.