Google illegally spied on workers before firing them, US labor board alleges

Google illegally spied on workers before firing them, US labor board alleges

Google violated US labor laws by spying on workers who were organizing employee protests, then firing two of them, according to a complaint filed by the National Labor Relations Board (NLRB) today.

Twitter now supports hardware security keys for iPhones and Android

Twitter now supports hardware security keys for iPhones and Android

Now anyone with a security key set up on their Twitter account can use that same key to log in from their mobile device, so long as the key is supported.

France rocked again by demonstrations against the new “Global Security Law”, which includes mass surveillance by police drones

France rocked again by demonstrations against the new “Global Security Law”, which includes mass surveillance by police drones

The proposed legislation would bring in wide-ranging police surveillance in France, but the main concern of demonstrators is Article 24, which is designed to penalize the “malicious” dissemination of images of French police officers: Pending legislation in France’s parliament would create a new criminal offense for publishing images of police officers with intent to cause them harm.

Inside the French government’s mission to develop an encrypted messaging platform

Inside the French government’s mission to develop an encrypted messaging platform

Although DINUM wasn’t looking for an open source solution specifically, it discovered Matrix; a decentralised communication protocol developed with interoperability and privacy in mind.

Second Swiss firm allegedly sold encrypted spying devices

Second Swiss firm allegedly sold encrypted spying devices

Omnisec was one of the largest competitors of Crypto AG.Swiss cryptologist and professor Ueli Maurer was a consultant for Omnisec for years and told SRF that in 1989 US intelligence services (National Security Agency) contacted Omnisec through him.

O&O ShutUp10: Free antispy tool for Windows 10

O&O ShutUp10: Free antispy tool for Windows 10

O&O ShutUp10 means you have full control over which comfort functions under Windows 10 you wish to use, and you decide when the passing on of your data goes too far.Adapt your security settings Protect your privacy Control location services Do not pass on your user data and diagnostics Further information.

Microsoft and OpenAI partner to propose digital transformation of export controls

Microsoft and OpenAI partner to propose digital transformation of export controls

For these reasons, restricting the problematic users and uses of these technologies is the more targeted and balanced of traditional export controls approaches, as it protects national security interests while preserving beneficial uses and tech leadership.

Tesla Hacked and Stolen Again Using Key Fob

Tesla Hacked and Stolen Again Using Key Fob

The key fob for the Model X key uses Bluetooth Low Energy (BLE) to interface with a smartphone app to allow for keyless entry, which is where the vulnerabilities lie, researchers said in a press release published online about the hack.

Exclusive: WhiteHat Jr Bug Had Exposed Personal Data of 2.8 Lakh Students

Exclusive: WhiteHat Jr Bug Had Exposed Personal Data of 2.8 Lakh Students

The security researcher who discovered the vulnerability and made multiple responsible disclosures to the company between 6 October and 20 November wished not to be named.He has confirmed to The Quint that access to the company’s AWS servers have now been restricted by the company as of 21 November.

'Smart' doorbells for sale on Amazon, eBay came stocked with security vulnerabilities

'Smart' doorbells for sale on Amazon, eBay came stocked with security vulnerabilities

In this case, researchers bought another device from Amazon and eBay that was vulnerable to KRACK, a three-year-old bug that attackers could use to eavesdrop on wireless networks.

No Safety without (Cyber-)Security!

No Safety without (Cyber-)Security!

It’s a common experience: I talk to people developing safety-critical embedded systems, be it cars or medical devices, and, while clearly serious about product safety, they show little interest in security.

Police in Mississippi To Pilot a Program to Live-Stream Amazon Ring Cameras

Police in Mississippi To Pilot a Program to Live-Stream Amazon Ring Cameras

Red alert: The police surveillance center in Jackson, Mississippi, will be conducting a 45-day pilot program to live stream the security cameras, including Amazon Ring cameras, of participating residents.

Six Tips for Using a Burner Phone to Enhance Your Privacy – Spycraft 101

Six Tips for Using a Burner Phone to Enhance Your Privacy – Spycraft 101

Whether you are living and working in a high-threat environment or period of civil unrest, worry about being vulnerable to hacking of your financial data or online profiles, or are simply an advocate for personal privacy and liberty, it’s important to understand the methods by which you are tracked, and by whom, and for what purpose.

Apple lets some Big Sur network traffic bypass firewalls

Apple lets some Big Sur network traffic bypass firewalls

He set Lulu and Little Snitch to block all outgoing traffic on a Mac running Big Sur and then ran a small programming script that had exploit code interact with one of the apps that Apple exempted.

The 200 Most Common Online Passwords of 2020 Are Awful

The 200 Most Common Online Passwords of 2020 Are Awful

Understandably, it’s difficult to keep track of passwords, especially this year with the rise of online work.According to the survey done by NordPass, nowadays, the average user has around 100 passwords,” Cerniauskaite said.

Dating Site Bumble Leaves Swipes Unsecured for 100M Users

Dating Site Bumble Leaves Swipes Unsecured for 100M Users

Bumble fumble: An API bug exposed personal information of users like political leanings, astrological signs, education, and even height and weight, and their distance away in miles.

Proposed FTC settlement is a disservice to Zoom customers, says Commissioner

Proposed FTC settlement is a disservice to Zoom customers, says Commissioner

Zoom and the Federal Trade Commission (FTC) have come to a tentative settlement agreement regarding the video conferencing company’s false advertising of end-to-end encryption along with other issues.

Microsoft Warns: A Strong Password Doesn’t Work, Neither Does Typical Multi-Factor Authentication

Microsoft Warns: A Strong Password Doesn’t Work, Neither Does Typical Multi-Factor Authentication

picture alliance via Getty Images The Director of Identity Security at Microsoft has been warning about the inefficacy of passwords and more recently about standard Multi-Factor Authentication or MFA.He should know: the team he works with at Microsoft defends against hundreds of millions of password-based attacks every day.

Speech readied for CSIS boss raises spectre of ‘hostile’ nations hunting for personal data through schools and businesses

Speech readied for CSIS boss raises spectre of ‘hostile’ nations hunting for personal data through schools and businesses

Concern is growing within Canada’s spy agency about the threat posed by hostile state actors, especially China and Russia, looking to steal intellectual property and “large digital data sets” from private companies and academic institutions.

130k+ extremely NSFW sexual photos, video and audio leaked by ‘private social network’

130k+ extremely NSFW sexual photos, video and audio leaked by ‘private social network’

Given that this bucket belongs to LimitChat, which we believe is a product of FaceChance, then LimitChat users have just had their most sensitive, explicit moments leaked online for anyone who knows where to look.

Thinking like a spy can help us sort truth from lies, says former head of GCHQ

Thinking like a spy can help us sort truth from lies, says former head of GCHQ

In a new book, intelligence and security expert Sir David Omand shows how we can learn to make better judgements by thinking like a spy.How Spies Think: Ten Lessons in Intelligence by David Omand (Viking, £20) is out now.

EU Lawmakers Seek Access to Encrypted Signal, WhatsApp Chats: Reports

EU Lawmakers Seek Access to Encrypted Signal, WhatsApp Chats: Reports

Lawmakers in the European Union may push for access to end-to-end encrypted chats in popular apps such as Signal and WhatsApp, according to a draft proposal circulated by the German government—currently president of the EU—over the weekend.

Zoom strong-armed by US watchdog to beef up security after boasting of end-to-end encryption that didn't exist

Zoom strong-armed by US watchdog to beef up security after boasting of end-to-end encryption that didn't exist

The commission's investigation also dug into Zoom’s earlier claim it offered 256-bit end-to-end encryption when in fact the feature didn't actually exist – the software maker says it has since implemented the technology.

EU continues to push for lawful access (aka backdoors) to end-to-end encrypted data

EU continues to push for lawful access (aka backdoors) to end-to-end encrypted data

A leaked draft resolution from the Council of the European Union highlights that the government is planning to crack down on the end-to-end (e2e) encryption used by messaging apps such as Signal and WhatsApp. What the EU is calling for is a “balance” between regular encryption use and lawful access to encrypted data.

US Government Continues Encryption War

US Government Continues Encryption War

Weakening encryption will not solve these issues, and that's probably because they were not the the focus of the Act. Instead, it seems that this law seeks to criminalises strong encryption that does not have backdoors, even though the government knows full well that this will not stop criminals.

Appeals court rules Baltimore “spy plane” does not violate privacy rights

Appeals court rules Baltimore “spy plane” does not violate privacy rights

Concluding that Baltimore’s Aerial Investigative Research (AIR) Program does not violate a reasonable expectation of privacy in a world where security cameras are everywhere, a federal appeals court today upheld a lower court decision, refusing to temporarily block the police department’s so-called “spy plane.”.

Threema Multi-Device: An Architectural Overview

Threema Multi-Device: An Architectural Overview

If, however, the multi-device protocol is required to meet Threema standards, things get complicated.In order to fulfill Threema’s requirements, a multi-device solution must, of course, provide full end-to-end encryption.

Google reCAPTCHA service under the microscope: Questions raised over privacy promises, cookie use

Google reCAPTCHA service under the microscope: Questions raised over privacy promises, cookie use

Two different domains generally shouldn't have access to the same set of cookie data, based on the distinction between first-party and third-party resources in the web browser security model."Triangle syncs expand an advertising universe and make it possible to target someone across more domains," Edwards told The Register .

Lazada’s Personal Data Breach and Rethinking Cost-Benefit Analysis of PDPA Compliance

Lazada’s Personal Data Breach and Rethinking Cost-Benefit Analysis of PDPA Compliance

In other cases where the personal data breach appears to be more a matter of ignorance and one-time mistakes, fines in the similar range as Grabcar Pte Ltd [2020] SGPDPC 14 were imposed.

Should You Use Biometric Locks on Your Devices?

Should You Use Biometric Locks on Your Devices?

As such, many cybersecurity experts actually recommend biometric locks like fingerprint, face scan, or retina scan instead.No matter what protection you go with for your devices – be it password, PIN, or biometric lock – make sure that you’ve done your research.