Russia blocks mailbox.org again

Russia blocks mailbox.org again

I'm not quite sure whether you are aware or not, but Russian authorities put IPs and hostnames in the country-wide block list (22-Sep-2020).2) Unofficial web-site with aggregated data about blocked IPs and hostnames.

Surveillance company harassed female employees using its own facial recognition technology

Surveillance company harassed female employees using its own facial recognition technology

After the Slack incident was reported to HR, Verkada CEO Filip Kaliszan gave employees in the Slack channel a choice: leave the company or have their stock options reduced.

CDO Question to Ask About Data Protection

CDO Question to Ask About Data Protection

Unless you know what data your organization holds, you can’t track and protect it.Mapping how data is transferred from one system to another helps you understand how personal data moves inside your organization and identify critical privacy compliance issues such as cross-border transfers.

Combating abuse in Matrix - without backdoors.

Combating abuse in Matrix - without backdoors.

Admins running servers in particular jurisdictions then have the option to enforce whatever rules they need on their servers (e.g. they might want to subscribe to reputation feeds from a trusted source such as the IWF, identifying child sexual abuse content, and use it to block it from their server).This isn’t just about combating abuse - but the same system can also be used to empower users to filter out spam, propaganda, unwanted NSFW content, etc on their own terms.

Sales Calls Have Gone Virtual, and AI Is Listening In

Sales Calls Have Gone Virtual, and AI Is Listening In

Some companies are making the most of this shift by using tools powered by artificial intelligence to track and analyze their salesforce’s virtual pitches.“You definitely miss the lunch, the dinner, the happy hour,” says Jeramee Waldum, vice president of global sales at MavenLink, a maker of project management software whose dozens of once-traveling salespeople are now stuck behind webcams.

The FBI Team Sent to ‘Exploit’ Protesters’ Phones in Portland

The FBI Team Sent to ‘Exploit’ Protesters’ Phones in Portland

An official familiar with the Portland operation said the email was facetious in intent and maintained that there was no difference between the legal authorities governing the Fly Team and those that applied to local agents.

What Facebook Did to American Democracy

What Facebook Did to American Democracy

The Trump campaign was working to suppress “idealistic white liberals, young women, and African Americans,” and they’d be doing it with targeted, “dark” Facebook ads.“I wouldn’t have come aboard, even for Trump, if I hadn’t known they were building this massive Facebook and data engine,” Bannon told them.

Four eBay Employees To Plead Guilty In Bizarre Cyberstalking Plot

Four eBay Employees To Plead Guilty In Bizarre Cyberstalking Plot

Four former eBay employees will plead guilty to carrying out a targeted cyberstalking campaign against bloggers critical of the e-commerce giant, prosecutors said Wednesday, including sending items such as a bloody pig mask and a box of live cockroaches to a suburban Boston couple.

Chinese database detailing 2.4 million influential people, their kids, their addresses, and how to press their buttons revealed

Chinese database detailing 2.4 million influential people, their kids, their addresses, and how to press their buttons revealed

“The data collected about individuals and institutions and the overlaid analytic tools from social media platforms provide China enormous benefit in opinion formation, targeting, and messaging.”.

Hunchly - OSINT Articles - How to Blow Your Online Cover With URL Previews

Hunchly - OSINT Articles - How to Blow Your Online Cover With URL Previews

Updated: January 5, 2019 — Additional testing was performed against Skype that revealed that URL previews were still working.Slack was happy to generate URL previews and identified itself with the following User-Agent:.

Web browsing histories are private personal data - now what

Web browsing histories are private personal data - now what

In 2009-2011 we did some research work motivated with a positive aim of educating web users about certain risks of browsing history leaks.The authors replicated also the theoretical potential for third-party resource providers (i.e. trackers) to reidentify users based on web browsing history fingerprints.

Ex-Uber chief security officer charged, accused of covering up theft of personal info from databases by hackers

Ex-Uber chief security officer charged, accused of covering up theft of personal info from databases by hackers

As Uber's chief security officer, Joe Sullivan broke the law by hushing up the theft of millions of people's details from the app maker's databases by hackers, prosecutors say.

Fawkes tool protects your image from being identified by facial recognition software

Fawkes tool protects your image from being identified by facial recognition software

Try out Fawkes the new pixel blurring tool to avoid artificial intelligence and deep learning facial recognition software.The researcher have noted that during experiments, Fawkes provided high levels of protection against facial recognition models, the team said, regardless of how the models were trained.

Team with Canadian military intelligence unit data-mined social media accounts of Ontarians during pandemic

Team with Canadian military intelligence unit data-mined social media accounts of Ontarians during pandemic

Brig.-Gen. Conrad Mialkowski, who had PiT assigned to his headquarters during the Canadian Forces pandemic response, said the team did not break any laws or violate military regulations.Such information helps inform the Canadian military about the situation they would be operating in during the pandemic, said Mialkowski, commander of Joint Task Force Central.

Free VPNs based in Hong Kong caught logging

Free VPNs based in Hong Kong caught logging

This batch of fake no log VPNs was discovered by the research team at VPNMentor, who published the results on their blog on July 15th, 2020 after notifying both the offending VPNs and relevant authorities and confirming that the exposed server was finally being protected.

This tech makes your online photograph difficult for Facial Recognition Software to recognize

This tech makes your online photograph difficult for Facial Recognition Software to recognize

Researchers develop a new technique that will keep your online photos safe from facial recognition algorithms.The research, which has been ongoing for more than six months, is targeted at countering the facial-recognition algorithms of big tech firms such as Facebook and Google.

This Game Is Collecting Your Steam Log Ins For “Marketing Purposes,” But Can’t Ensure Data Security

This Game Is Collecting Your Steam Log Ins For “Marketing Purposes,” But Can’t Ensure Data Security

In fact, most of us don’t even know what personal data many Steam games collect which is why even the most invasive EULA agreements slide right by us.However, NETICTECH cannot ensure or warrant the security of any data against any possible loss or unauthorized access.

Private Internet Access now offers 24/7 live chat customer support

Private Internet Access now offers 24/7 live chat customer support

Private Internet Access is proud to announce the launch of 24/7 live chat coverage by our customer support team.Private Internet Access has been taking many steps to provide the best no log VPN service for the world and 24/7 live chat is just a part of that.

Local News Stations Run Propaganda Segment Scripted and Produced by Amazon

Local News Stations Run Propaganda Segment Scripted and Produced by Amazon

Local news stations across the U.S. aired a segment produced and scripted by Amazon which touts the company's role in delivering essential groceries and cleaning products during the COVID-19 pandemic, and its ability to do so while "keeping its employees safe and healthy.".

Exclusive: New York Times phasing out all 3rd-party advertising data

Exclusive: New York Times phasing out all 3rd-party advertising data

The New York Times will no longer use 3rd-party data to target ads come 2021, executives tell Axios, and it is building out a proprietary first-party data platform.Beginning in July, The Times will begin to offer clients 45 new proprietary first-party audience segments to target ads.

Facebook Gets Inside Look at Competition’s Data With Giphy Buy

Facebook Gets Inside Look at Competition’s Data With Giphy Buy

While looking at Giphy, Facebook executives realized that they shouldn’t just make an investment -- by buying the company outright, they could get something else they value: data.After Giphy joins Facebook, the company will maintain those integrations, and will keep getting data from GIF searches and posts around the internet.

Keybase joins Zoom

Keybase joins Zoom

Today we're announcing that Zoom acquired Keybase.We're thrilled with the match, and we're excited to be working on security that affects everyone we know.You can use the Zoom app on just about any platform, but you can also dial in over a plain old copper phone line.

GoDaddy reports data breach involving SSH access on hosting accounts

GoDaddy reports data breach involving SSH access on hosting accounts

GoDaddy on Tuesday reported [PDF] an October data breach to Californian authorities, stating that an unauthorised individual was able to access SSH accounts used in its hosting environment.

You Could Get Jailed For Not Installing Aarogya Setu App: Noida Police

You Could Get Jailed For Not Installing Aarogya Setu App: Noida Police

However, the police officials of Noida and Greater Noida have said that they will let go of the people who agree to download the app in front of them at the time of checking.

India acknowledges, but brushes aside, features-not-bugs in Aarogya Setyu virus contact-tracing app

India acknowledges, but brushes aside, features-not-bugs in Aarogya Setyu virus contact-tracing app

The Indian government has acknowledged “potential security issues” in the Aarogya Setyu contact-tracing app which its opposition labels as a ‘surveillance system with no oversight,’ but says the code issues are not that big a deal.

Chinese Hackers Using New iPhone Hack to Spy On Uyghur Muslims

Chinese Hackers Using New iPhone Hack to Spy On Uyghur Muslims

A Chinese hacking group has been found leveraging a new exploit chain in iOS devices to install a spyware implant targeting the Uyghur Muslim minority in China's autonomous region of Xinjiang.

COVID-19’s impact on Tor

COVID-19’s impact on Tor

The world won’t be the same after this crisis, and the need for privacy and secure access to information will become more urgent.

Memento Labs, the Reborn Hacking Team, Is Struggling

Memento Labs, the Reborn Hacking Team, Is Struggling

"There’s only two developers left, and none of them are competent enough to keep up certain projects," a former Hacking Team and Memento Labs employee, who asked to remain anonymous to discuss internal issues, told Motherboard.

Waterfox has joined System1

Waterfox has joined System1

Throughout the years people have always asked about Waterfox and privacy, and if they’ve ever wanted more than it can afford, I’ve always pushed them to use Tor. Waterfox was here for customisations and speed, with a good level of privacy.

Let’s take back control of our events! #JoinMobilizon

Let’s take back control of our events! #JoinMobilizon

At this point, we are not talking about software, code or graphics yet: we are still focusing on the uses, the reality of organizing events and the real problems faced by the people who set them up.