Governments of the world just ramped up spying on reporters

Governments of the world just ramped up spying on reporters

They had been working on an investigation into surveillance on journalists and human rights activists in a particular Middle Eastern nation, and had been in contact with sources the government was hostile to.One group of foreign correspondents, working on sensitive stories, were finding that their phone calls to some sources were automatically redirected.

The Indian government is reportedly cracking down on VPN usage in Jammu & Kashmir

The Indian government is reportedly cracking down on VPN usage in Jammu & Kashmir

The Army stops citizens and checks their phones for VPN applications while the internet service providers (ISPs) in the region are sending written notices to users to attempt to discourage them from VPN use.

Wearable Microphone Jamming

Wearable Microphone Jamming

Furthermore, by arranging the transducers in a ring layout, our wearable jams in multiple directions and protects the privacy of its user’s voice, anywhere and anytime, without requiring its user to manually point the jammer to the eavesdropping microphones.

Signal Is Finally Bringing Its Secure Messaging to the Masses

Signal Is Finally Bringing Its Secure Messaging to the Masses

Another new feature it's testing, called "secure value recovery," would let you create an address book of your Signal contacts and store them on a Signal server, rather than simply depend on the contact list from your phone.

The industry is looking to first-party data to replace cookies, but the open web may lose out

The industry is looking to first-party data to replace cookies, but the open web may lose out

At the Interactive Advertising Bureau’s Annual Leadership Meeting in Palm Springs, California, on Feb. 10, the IAB Tech Lab proposed developing a new identifier based on people’s email addresses or phone numbers, which provide a more consistent, deterministic way of recognizing someone than the third-party cookie ever did.

Feds Find Fourth Amendment Workaround, Buy Phone Locations From Marketing Firms

Feds Find Fourth Amendment Workaround, Buy Phone Locations From Marketing Firms

DHS uses the data purchased from private marketing companies to generate law enforcement leads and search for undocumented immigrants, according to the Journal, which first broke news of the arrangements on Friday.

The FBI still hasn't unlocked Pensacola shooter's iPhones

The FBI still hasn't unlocked Pensacola shooter's iPhones

According to the report: *-- The FBI has reconstructed an iPhone belonging to the shooter behind the December Naval Air Station attack in Pensacola, Florida, but still can't access the encrypted data on the device, Director Christopher Wray said Wednesday.

FCC: Big Telco Broke the Law in Selling All Customers' Location Data

FCC: Big Telco Broke the Law in Selling All Customers' Location Data

According to Axios, the Federal Communications Commission (FCC) is proposing fines against cell service providers, like AT&T and T-Mobile, for illegally selling data on the real-time location of their customers without the customers’ knowledge.

Android User Warning: Here Are 24 ‘Dangerous’ Apps With A Dark Secret—And 382 Million Installs

Android User Warning: Here Are 24 ‘Dangerous’ Apps With A Dark Secret—And 382 Million Installs

And so the team says it decided to investigate, finding links to a Chinese company called Shenzhen HAWK that is “secretly” behind Hi Security as well as four other app developers.

Telegram Founder on WhatsApp Hacks: Backdoors Are Camouflaged as Security Flaws

Telegram Founder on WhatsApp Hacks: Backdoors Are Camouflaged as Security Flaws

Durov says that despite iOS devices having “loads of privacy-related issues,”, WhatsApp is the culprit here, as the corrupt video vulnerability exposes not only iPhones, but also Android and Windows Phone devices.

Ajit Pai: Carrier sales of phone-location data is illegal, FCC plans punishment

Ajit Pai: Carrier sales of phone-location data is illegal, FCC plans punishment

Mobile network operators who sold their customers' real-time location data violated US law and the Federal Communications Commission will try to punish carriers that did so, FCC Chairman Ajit Pai wrote today.

FCC Says 'One or More' Phone Carriers Illegally Shared Location Data, Fueling Black Market Sales

FCC Says 'One or More' Phone Carriers Illegally Shared Location Data, Fueling Black Market Sales

Photo: Chip Somodevilla (GettyIn letters addressed to oversight lawmakers on Friday, FCC Chairman Ajit Pai announced that his agency’s nearly two-year investigation into the unauthorized sale of consumers’ phone location data had finally come to an end.

Border Patrol Detains Iranian-Born American Soldier at the Border, Seizes Their Phone

Border Patrol Detains Iranian-Born American Soldier at the Border, Seizes Their Phone

According to the soldier, the agent then asked a series of questions, and said that the service member's phone number—which they had not provided to the agent—was "popping" up on multiple different travelers that had been flying recently.

Bill Would Reform NSA Surveillance Program

Bill Would Reform NSA Surveillance Program

A bipartisan cadre of lawmakers in the House and Senate have introduced legislation that would reform the 9/11-era authorities used by the intelligence community to access Americans’ phone records and other domestic communications.

Setting the Record Straight: PinePhone Misconceptions

Setting the Record Straight: PinePhone Misconceptions

Let’s start with the Allwinner A64 SoC, which is the brains of the PinePhone; it runs mainline Linux, uses mainline ATF and u-boot and there are open source drivers for all main SoC components.

Trying to get pregnant? Period tracker apps come with privacy concerns

Trying to get pregnant? Period tracker apps come with privacy concerns

That’s the issue raised by a new review of five popular period tracker apps by Consumer Reports' Digital Lab, which tests apps to see how well they protect consumers’ privacy and data.

Can hardware ever be trusted? The Betrusted project aims to find out by going back to basics

Can hardware ever be trusted? The Betrusted project aims to find out by going back to basics

Betrusted is more than just a secure CPU – it is a system complete with screen and keyboard, because privacy begins and ends with the user.” Its aim is to create a secure communication device whose hardware can be trusted, and which does protect privacy.

Jared Kushner reportedly used WhatsApp to chat with Mohammed bin Salman, who allegedly used the same app to hack Jeff Bezos

Jared Kushner reportedly used WhatsApp to chat with Mohammed bin Salman, who allegedly used the same app to hack Jeff Bezos

New reporting alleges that Saudi Arabian crown prince Mohammed bin Salman hacked Amazon CEO Jeff Bezos‘ phone through WhatsApp. The report raises renewed concern about top White House aide Jared Kushner’s reported WhatsApp communications with bin Salman.

Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources

Exclusive: Apple dropped plan for encrypting backups after FBI complained - sources

SAN FRANCISCO (Reuters) - Apple Inc (AAPL.O) dropped plans to let iPhone users fully encrypt backups of their devices in the company’s iCloud service after the FBI complained that the move would harm investigations, six sources familiar with the matter told Reuters.

FBI used Graykey to unlock an iPhone 11 Pro, which was previously thought to be the most secure iPhone

FBI used Graykey to unlock an iPhone 11 Pro, which was previously thought to be the most secure iPhone

Specifically, a product called Graykey was used in a case against Baris Ali Koch to unlock Koch’s iPhone – an iPhone 11 Pro. Graykey works by bypassing the timeout functionality in iOS and allows for brute forcing of the passcode or password.

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

LightRocket via Getty ImagesQuestions are being asked about the FBI’s motivations over demanding Apple help it unlock the iPhones of the Pensacola shooting suspect, after Forbes uncovered a search warrant that strongly indicates the feds have access to a tool that can grab data on the latest, and most secure, iPhones.

How Twitter Misused Personal Phone Numbers for Advertising

How Twitter Misused Personal Phone Numbers for Advertising

This is in no doubt partly due to the nature of the platform – Twitter doesn’t encourage users to upload their entire lives and all associated media to the service in the way that Facebook and others do.

Open Contacts  -  F-Droid - Free and Open Source Android App Repository

Open Contacts - F-Droid - Free and Open Source Android App Repository

read the contents of your shared storage.Allows the app to read the contents of your shared storage.Allows the app to write the contents of your shared storage.Allows the app to access the phone features of the device.

US Government-funded Android phones come preinstalled with unremovable malware

US Government-funded Android phones come preinstalled with unremovable malware

An Android phone subsidized by the US government for low-income users comes preinstalled with malware that can't be removed without making the device cease to work, researchers reported on Thursday.

Microsoft Outsourced Skype, Cortana Voice Analysis to China With Virtually No Security in Place: Report

Microsoft Outsourced Skype, Cortana Voice Analysis to China With Virtually No Security in Place: Report

A man walks past Google offices in Beijing in 2014.Photo: Greg Baker/AFP (AP)Microsoft had “no security measures” on a program that had humans transcribe user voice recordings from its Skype video calling service and Cortana assistant, the Guardian reported on Friday, even when those workers were located in China.

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Prompted by the post, many users noticed that the storage scanner in the Device Care section included a little note: “powered by 360.” Even in China, Qihoo 360 is well known for its past privacy transgressions and controversies and it’s understandable why Samsung users would be incredibly concerned that anything at all from Qihoo is preinstalled on their phone.

United States government-funded phones come pre-installed with unremovable malware

United States government-funded phones come pre-installed with unremovable malware

It’s with great frustration that I must write about yet another unremovable pre-installed malicious app found on the UMX U686CL phone: the mobile device’s own Settings app functions as a heavily-obfuscated malware we detect as Android/Trojan.

FBI asks Apple for phone data from suspected Florida naval base shooter

FBI asks Apple for phone data from suspected Florida naval base shooter

The FBI asked Apple this week to help extract data from iPhones that belonged to the Saudi aviation student who investigators say fatally shot three sailors at a U.S. naval base in Florida last month.

Washington Post Hacked into a Chevy Volt to Show How Much Cars Are Spying on Their Owners

Washington Post Hacked into a Chevy Volt to Show How Much Cars Are Spying on Their Owners

This was proven in a big way by Washington Post tech columnist Geoffrey Fowler (pictured above), who dug into just how much information his test car, a 2017 Chevrolet Volt, is collecting.

Leaked data proves just how much our phones are spying on us

Leaked data proves just how much our phones are spying on us

The investigation was coordinated by the New York Times Privacy Project and used a leak from a location data company, one of many unknown businesses from an under-reported industry dedicated to using electronic data to track every single one of us everywhere we go.