Top tip: Don't upload your confidential biz files to free malware-scanning websites – everything is public

Top tip: Don't upload your confidential biz files to free malware-scanning websites – everything is public

By passively observing three such services over the course of three days earlier this month, Cylab hackers were able to collect more than 200 documents, mostly things like purchase orders and invoices.

Why You Should Never Borrow Someone Else's Charging Cable

Why You Should Never Borrow Someone Else's Charging Cable

For the moment, Henderson says, a bigger threat than malicious charging cables is USB charging stations you see in public places like airports.Many travelers know that, in a pinch, the hotel front desk will often have a drawer of charging cables that were left behind by guests.

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Google Warning: Tens Of Millions Of Android Phones Come Preloaded With Dangerous Malware

Millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google's own security research team.Android is a thriving open-source community, which is great for innovation but not so great when threat actors seize the opportunity to hide malware in basic software loads that come on boxed devices.

Cops Are Giving Amazon's Ring Your Real-Time 911 Caller Data

Cops Are Giving Amazon's Ring Your Real-Time 911 Caller Data

According to some internal documents, police CAD data is received by Ring’s “Neighbors News team” and is then reformatted before being posted on Neighbors in the form of an “alert” to users in the vicinity of the alleged incident.

This Tool Lets You See Facebook’s Targeted Political Ads All Over the World

This Tool Lets You See Facebook’s Targeted Political Ads All Over the World

The researchers had to collect this data by scraping Facebook's Ad Library API, a tool Facebook released after Mozilla called on the company to make its political advertisements more transparent ahead of the May 2019 EU elections.

FaceApp responds to privacy concerns

FaceApp responds to privacy concerns

Though it doesn’t yet have a very smooth way to do this — instead it asks users to send delete requests via the mobile app using “Settings->Support->Report a bug” with the word “privacy” in the subject line, adding that it’s “working on a better UI for that”.

Academics steal data from air-gapped systems via a keyboard's LEDs

Academics steal data from air-gapped systems via a keyboard's LEDs

The research team behind this exfiltration method says it tested the CTRL-ALT-LED technique with various optical capturing devices, such as a smartphone camera, a smartwatch's camera, security cameras, extreme sports cameras, and even high-grade optical/light sensors.

Hackers Infect Pale Moon Archive Server With a Malware Dropper

Hackers Infect Pale Moon Archive Server With a Malware Dropper

The Pale Moon web browser team announced today that their Windows archive servers were breached and the hackers infected all archived installers of Pale Moon 27.6.2 and below with a malware dropper on December 27, 2017.

China Is Forcing Tourists to Install Text-Stealing Malware at its Border

China Is Forcing Tourists to Install Text-Stealing Malware at its Border

Foreigners crossing certain Chinese borders into the Xinjiang region, where authorities are conducting a massive campaign of surveillance and oppression against the local Muslim population, are being forced to install a piece of malware on their phones that gives all of their text messages as well as other pieces of data to the authorities, a collaboration by Motherboard, Süddeutsche Zeitung, the Guardian , the New York Times , and the German public broadcaster NDR has found.

Most commonly hacked passwords - is one of them yours?

Most commonly hacked passwords - is one of them yours?

An analysis of the 100,000 most regular passwords made public by data breaches and hacking campaigns suggests that tremendous swathes of individual still don't understand the importance of having a strong password – or how to create one – using names, sports teams, groups and even just keys close together on the keyboard in an effort to secure their accounts.

Epic privacy fail: WeTransfer shared its users' files with the wrong people

Epic privacy fail: WeTransfer shared its users' files with the wrong people

The file sharing service sent the following email to impacted users. Dear WeTransfer user, We are writing to let you know about a security incident in which a number of WeTransfer service emails were sent to the wrong people. I mean, look, WeTransfer had one job -- share files with the correct friggin' people!

Microsoft: tell us if you want us to build an ad blocker into Edge

Microsoft: tell us if you want us to build an ad blocker into Edge

In a recent AMA on Reddit, the Microsoft Edge dev team told users to tell them if they wanted an ad blocker build into the Edge browser.

Crowdselling your personal data through Firefox

Crowdselling your personal data through Firefox

The Streamr community has been talking about crowdselling data and forming data unions since at least the . It’s this step which will mean that data unions can be formed. Working on developing Community Products; the platform and tools to create digital data unions.

A new camera can photograph you from 45 kilometers away

A new camera can photograph you from 45 kilometers away

Their technique uses single-photon detectors combined with a unique computational imaging algorithm that achieves super-high-resolution images by knitting together the sparsest of data points. The big advantage of this kind of active imaging is that the photons reflected from the subject return to the detector within a specific time window that depends on the distance.

Chinese Scientists Create Camera That Can Spy You 28 Miles Away, Even Through Smog

Chinese Scientists Create Camera That Can Spy You 28 Miles Away, Even Through Smog

But even while the gating and infrared lasers greatly increase the density of captured photons and reduce the noise in comparison to other methods, the amount of points captured by the camera is still too low to generate a detailed image on their own.

Facebook Entrusts Indian Workers to Label Millions of Private Photos

Facebook Entrusts Indian Workers to Label Millions of Private Photos

According to Reuters, Facebook has been hiring a team of contract workers in India to 'label' images, statuses, and other content, working through millions of entries going as far back as 2014.

‎Umbrella Security

‎Umbrella Security

Adapt your plans based on live threat alerts from trusted sources, or share incident forms with your team. * Protect devices and data with simple step-by-step guides to digital security tools *. * Protect your team with shareable checklists and incident forms *.

Facebook taps lawyer who helped write Patriot Act as new general counsel

Facebook taps lawyer who helped write Patriot Act as new general counsel

In a press release from 2002, Assistant Attorney General Viet Dinh said of Newstead, "Her enhanced leadership duties and her excellent service on a range of issues — including helping craft the new U.S.A. Patriot Act to protect the United States against terror — have earned her this important distinction.

Cybersecurity Apps that will be Helpful in 2019

Cybersecurity Apps that will be Helpful in 2019

In case you would like to know what services a computer is running for network inventory purposes and managing service upgrades or to check which ports are open on a system and if those ports can be exploited in simulated attacks, then this is the right tool to implement a security strategy.

Former Mozilla exec: Google has sabotaged Firefox for years

Former Mozilla exec: Google has sabotaged Firefox for years

"When I started at Mozilla in 2007 there was no Google Chrome, and most folks we spoke with inside [Google] were Firefox fans," Nightingale recollected in a Twitter thread on Saturday.

Amazon reportedly has thousands of people listening to snippets of Alexa conversations

Amazon reportedly has thousands of people listening to snippets of Alexa conversations

The report said the Amazon team transcribes the recordings and shares the conversations with other parts of the company in order to make Alexa's "understanding of human speech" better.

EXCLUSIVE: Documents Detailing Google’s ‘News Blacklist’ Show Manual Manipulation Of Special Search Results

EXCLUSIVE: Documents Detailing Google’s ‘News Blacklist’ Show Manual Manipulation Of Special Search Results

“The deceptive_news domain blacklist is going to be used by many search features to filter problematic sites that violate the good neighbor and misrepresentation policies,” the policy document says.

EFF’s New ‘Threat Lab’ Dives Deep into Surveillance Technologies—And Their Use and Abuse

EFF’s New ‘Threat Lab’ Dives Deep into Surveillance Technologies—And Their Use and Abuse

EFF is proud to announce its newest investigative team: the Threat Lab. Using a combination of research skills, the Threat Lab will take a deep dive into how surveillance technologies are used to target communities, activists, or individuals.

Third-party Facebook apps expose 540 million users’ details

Third-party Facebook apps expose 540 million users’ details

The cyber risk team at security firm UpGuard found one data store originating from the Mexico-based media company Cultura Colectiva of 146GB, containing more than 540 million records, detailing comments, likes, reactions, account names, Facebook IDs and more.

36 Undiscovered Flaws in 4G LTE Revealed by a New Security Tool

36 Undiscovered Flaws in 4G LTE Revealed by a New Security Tool

The way LTEFuzz works is that by using controllable open-source LTE software that can dynamically generate test cases and inject them into live networks, the KAIST team was able to see how specific various devices responded to potential attacks.

UK Drivers File GDPR Lawsuit Against Uber

UK Drivers File GDPR Lawsuit Against Uber

Four U.K. Uber drivers are filing a lawsuit against the company for alleged violations of EU’s General Data Protection Regulation (GDPR) law, according to a report by.

Turn in your smartphones! How Mueller kept a lid on Trump-Russia probe

Turn in your smartphones! How Mueller kept a lid on Trump-Russia probe

WASHINGTON (Reuters) - When members of Special Counsel Robert Mueller’s team investigating Russia’s role in the 2016 U.S. election have arrived for work each day, they have placed their mobile phones in a locker outside of their office suite before entering.

Researchers Create Fake Profiles on 24 Health Apps and Learn Most Are Sharing Your Data

Researchers Create Fake Profiles on 24 Health Apps and Learn Most Are Sharing Your Data

Though the company said it properly informed users about the data-sharing, the government’s health ministry has since promised an investigation into the app.

Artificial intelligence senses people through walls

Artificial intelligence senses people through walls

The researchers use a neural network to analyze radio signals that bounce off people’s bodies, and can then create a dynamic stick figure that walks, stops, sits, and moves its limbs as the person performs those actions.

Smart alarms left 3 million cars vulnerable to hackers who could turn off motors

Smart alarms left 3 million cars vulnerable to hackers who could turn off motors

Two popular smart alarm systems for cars had major security flaws that allowed potential hackers to track the vehicles, unlock their doors and, in some cases, cut off the engine.

More