The US military reportedly bought location data mined from a popular Muslim prayer app to track users for 'counterterrorism'

The US military reportedly bought location data mined from a popular Muslim prayer app to track users for 'counterterrorism'

One source of location data bought by the military is Muslim Pro, a prayer app with more than 98 million downloads worldwide, according to a new report from Vice's Motherboard.Muslim Pro sells location data to a third-party broker called X-Mode, according to Motherboard's report.

IRS being investigated for tracking American location data without a warrant

IRS being investigated for tracking American location data without a warrant

The IRS revealed to Senator Wyden’s office in June that the tax agency had bought a set of location data from a data broker known as Venntel.

Survey finds 85% of smartphone users believe they’re being spied on by a mobile app

Survey finds 85% of smartphone users believe they’re being spied on by a mobile app

A new survey by WhistleOut provides some numbers to back up a growing sentiment: That an app on your smartphone is spying on you right this second while you read this article.

Sensing the sensors

Sensing the sensors

Even the Camera application on my device can't access the sensors.Cometh Privacy Indicators , it does exactly what Apple's iOS does, show you an indicator whenever an application uses your device's camera or microphone.Do note that the application only shows indicator for the main camera sensor.

Apple and Google will alert you to COVID-19 contact

Apple and Google will alert you to COVID-19 contact

Apple and Google teamed up to develop push notifications that let iOS and Android users know if they might have been exposed to COVID-19.The companies announced the news on Tuesday and the effort is called Exposure Notifications Express.

Google wants to listen in to whatever you get up to in hotel rooms

Google wants to listen in to whatever you get up to in hotel rooms

Google wants its Nest Hub to become a fixture in hotel rooms so that guests can enjoy their stay without having to actually touch any of the amenities they are paying for.

Criminals Will Be Forced to Give Smartphone Passcodes, as per New Jersey Supreme Court Ruling

Criminals Will Be Forced to Give Smartphone Passcodes, as per New Jersey Supreme Court Ruling

As per NorthJersey, the defendant argued that giving his smartphone passcode would amount to be testimony, which would violate his Fifth Amendment rights and protections under the law.

How the government legally tracks your smartphone use with the Anomaly Six SDK

How the government legally tracks your smartphone use with the Anomaly Six SDK

ShareTweet A Virginia based government contracting firm called Anomaly Six LLC has been revealed to be inserting a proprietary software development kit (SDK) into over five hundred mobile apps then sharing gathered data with the government.

Report: Hundreds of apps have hidden tracking software used by the government

Report: Hundreds of apps have hidden tracking software used by the government

A new report exposes how a federal contractor secretly puts government tracking software into hundreds of mobile apps.Since the data Anomaly Six collects is technically anonymous and since it isn’t selling the data for commercial purposes — i.e. advertising or marketing — it’s fine to do this within the eyes of the law.

Google 'Spying' On People's App Use, Lawsuit Claims

Google 'Spying' On People's App Use, Lawsuit Claims

by Wendy Davis @wendyndavis, Yesterday Google employees “spy” on smartphone users, collecting their sensitive data and information about their use of other companies' apps, New York resident Robert McCoy alleges in a new class-action complaint.

Computer science student discovers privacy flaws in security and doorbell cameras

Computer science student discovers privacy flaws in security and doorbell cameras

Ring, Nest, SimpliSafe and eight other manufacturers of internet-connected doorbell and security cameras have been alerted to systemic design flaws discovered by Florida Tech computer science student Blake Janes that allows a shared account that appears to have been removed to actually remain in place with continued access to the video feed.

Facebook is tracking your phone’s activity

Facebook is tracking your phone’s activity

Well, open Facebook Settings and click on Ads, there you’ll see your information, interests and what kind of ads should be shown on your Newsfeed, which is basically facebook way of telling you that your data is being collected in order to show relevant ads according to your interests.

Facebook would have to pay $3.50 per month to U.S. users for sharing contact info: study

Facebook would have to pay $3.50 per month to U.S. users for sharing contact info: study

WASHINGTON (Reuters) - German Facebook users would want the social media platform to pay them about $8 per month for sharing their contact information, while U.S. users would only seek $3.50, according to a study of how people in various countries value their private information.

Location data: How much do wireless carriers keep?

Location data: How much do wireless carriers keep?

But the primary way iOS 13 and Android 10 do that – a notification to warn that one application or another has been getting your location when you weren’t using that app – only tells part of that privacy story.

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

“Our team found a way of manipulating specific actions and intents,” Erez Yalon, director of security research at Checkmarx said, “making it possible for any application, without specific permissions, to control the Google Camera app.

‘I just don’t like them’: Robbie Williams hasn't owned a phone since 2006

‘I just don’t like them’: Robbie Williams hasn't owned a phone since 2006

Despite being one of the UK’s most successful pop stars, with millions of social media followers to keep updated, Robbie Williams has revealed he hasn’t owned a phone since 2006.

Edward Snowden Explains How Smartphones Spy On Us

Edward Snowden Explains How Smartphones Spy On Us

In a recent on the Joe Rogan podcast show, the famous NSA whistleblower Edward Snowden explained how carriers and tech giants are surveilling users through smartphones.

Google and Amazon approved home speaker apps that spied on users

Google and Amazon approved home speaker apps that spied on users

"To prevent 'Smart Spies' attacks, Amazon and Google need to implement better protection, starting with a more thorough review process of third-party Skills and Actions made available in their voice app stores," the SLR researchers concluded.

Is America Finally Ready For A Surveillance-Free Smartphone?

Is America Finally Ready For A Surveillance-Free Smartphone?

If you follow the funding strategies for technology companies and the darlings of Silicon Valley, you know the smartphone space is a tough nut to crack.The company exists to serve a core mission—for Purism, the security and privacy of its customers—above a profit motive.

There is more than only black and white in information security and privacy

There is more than only black and white in information security and privacy

When it comes to information security and privacy, some people specialized in spreading black and white thinking.The new filter bubble, inflated by black and white thinking of like-minded people, is proclaimed as the only truth.

These startups aim to smash Apple and Google’s smartphone duopoly

These startups aim to smash Apple and Google’s smartphone duopoly

Purism, by contrast, is pursuing Apple-like vertical integration by developing its own operating system, optimizing hardware to run on it, and even launching a group of services under the banner of Librem One. While Purism’s product development approach has similarities to Apple’s, there are some critical differences.

Librem 5 Smartphone - Final Specs Announced – Purism

Librem 5 Smartphone - Final Specs Announced – Purism

Here’s a more detailed breakdown of the Librem 5 hardware and specific components included:. 3 Hardware Kill Switches: WiFi / Bluetooth Cellular Baseband Cameras & microphone All 3 off = additionally disable IMU+compass & GNSS, ambient light.

New Attack Lets Android Apps Capture Loudspeaker Data Without Any Permission

New Attack Lets Android Apps Capture Loudspeaker Data Without Any Permission

Nitesh Saxena also confirmed The Hacker News that the attack can not be used to capture targeted users' voice or their surroundings because "that is not strong enough to affect the phone's motion sensors, especially given the low sampling rates imposed by the OS," and thus also doesn't interfere with the accelerometer readings.

Academics steal data from air-gapped systems via a keyboard's LEDs

Academics steal data from air-gapped systems via a keyboard's LEDs

The research team behind this exfiltration method says it tested the CTRL-ALT-LED technique with various optical capturing devices, such as a smartphone camera, a smartwatch's camera, security cameras, extreme sports cameras, and even high-grade optical/light sensors.

Stalkerware Warning: Your Partner or Ex May Be Tracking Your Smartphone

Stalkerware Warning: Your Partner or Ex May Be Tracking Your Smartphone

Anti-virus software researchers report that thousands of people, mostly women, have “stalkerware” apps hidden on their phones — surreptitiously installed by their partners — that give the stalker access to the victim’s email, location, SMS, social media messages and even live feeds from their device cameras or microphones.

Why I don't like smartphones

Why I don't like smartphones

Smartphones have powerful CPUs and fast network connections, except that you aren't actually allowed to use these resources in any meaningful sense, because doing so consumes battery power, and people don't want the precious battery life of their phones drained unnecessarily.

Google Confirms Android Smartphone Security Backdoor

Google Confirms Android Smartphone Security Backdoor

Earlier this year, Forbes reported how a banking Trojan called Triada had been found on a bunch of brand new budget Android smartphones. Google has now confirmed that threat actors did, indeed, manage to compromise Android smartphones with the installation of a backdoor as part of a supply chain attack.

Germany: Backdoor found in four smartphone models; 20,000 users infected

Germany: Backdoor found in four smartphone models; 20,000 users infected

The BSI said the phones' firmware contained a backdoor trojan named Andr/Xgen2-CY.UK cyber-security firm Sophos Labs first spotted this malware strain in October 2018.

TikTok parent ByteDance is reportedly making a smartphone

TikTok parent ByteDance is reportedly making a smartphone

ByteDance’s smartphone patent acquisitions suddenly make more sense The Financial Times says that ByteDance CEO Zhang Yiming has “long dreamt” of building a smartphone full of preloaded apps.

Facebook's Not Listening Through Your Phone. It Doesn't Have To

Facebook's Not Listening Through Your Phone. It Doesn't Have To

But unlike the Amazon Echo, which listens for just one of four trigger words, millions or perhaps billions of words and phrases could land you in a Facebook targeting segment. Because it has no specific trigger word for Facebook, your phone would need to listen for every targetable keyword.