>4,000 Android apps silently access your installed software

>4,000 Android apps silently access your installed software

More than 4,000 Google Play apps silently collect a list of all other installed apps in a data grab that allows developers and advertisers to build detailed profiles of users, a recently published research paper found.

Taiwan is using a phone location “electronic fence” to help police track quarantined individuals

Taiwan is using a phone location “electronic fence” to help police track quarantined individuals

The “electronic fence” uses mobile phone data to notify police if the cell phones of any people under mandatory quarantine leave their home areas.Using phone location data to track quarantined individuals is still concerning surveillance no matter the perceived public good.

Unpatched bug in iOS 13.3.1 and later stops VPNs from encrypting all connections

Unpatched bug in iOS 13.3.1 and later stops VPNs from encrypting all connections

The VPN bypass bug in iOS 13.3.1 and later causes some internet connections to continue with their original, unencrypted connection – which is a security and privacy concern.Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization.

An insecure mess: How flawed JavaScript is turning web into a hacker's playground

An insecure mess: How flawed JavaScript is turning web into a hacker's playground

Overall, 87 percent of the Alexa sites and 46.5 percent of the .com sites use one of the 72 libraries.Additionally, 9.7 percent of the sites in the study use two or more vulnerable library versions.

Researchers expose vulnerabilities of password managers

Researchers expose vulnerabilities of password managers

Senior author of the study, Dr. Siamak Shahandashti from the Department of Computer Science at the University of York, said: "Vulnerabilities in password managers provide opportunities for hackers to extract credentials, compromising commercial information or violating employee information.

More than half of Americans want money, control in exchange for genetic data

More than half of Americans want money, control in exchange for genetic data

— As people become more aware of privacy concerns and the ways in which genomic database companies are profiting from their data, their expectations for compensation and control may increase, according to researchers at Penn State and Cornell University.

Dressing for the Surveillance Age

Dressing for the Surveillance Age

Later, when I spoke to Arun Ross, a computer-vision researcher at Michigan State University, he told me that a surgical mask alone might not block enough of my face’s pixels in a digital shot to prevent a face-recognition system from making a match; some algorithms can reconstruct the occluded parts of people’s faces.

'Ban this technology': students protest US universities' use of facial recognition

'Ban this technology': students protest US universities' use of facial recognition

The protests on Monday came after pushback led by students and digital rights group Fight for The Future against a proposed facial recognition program at the University of California – Los Angeles (UCLA) led the school to reverse course and drop the technology.

Many WhatsApp private groups are indexed in Google and open to the public

Many WhatsApp private groups are indexed in Google and open to the public

He noticed that the “Invite to Group via Link” function for WhatsApp private groups creates a link that, when posted on the public internet, ends up being indexed by search engines such as Google, DuckDuckGo, and Bing.

UCLA Abandons Plans to Use Facial Recognition After Backlash

UCLA Abandons Plans to Use Facial Recognition After Backlash

Ahead of a national day of action led by digital rights group Fight for the Future, UCLA has abandoned its plans to become the first university in the United States to adopt facial recognition technology.

Private Internet Access refund policy extended to 30 days

Private Internet Access refund policy extended to 30 days

Effective immediately, Private Internet Access subscribers will be covered under our new 30 day money back guarantee.The new Private Internet Access money back guarantee is simple: you can get a full refund within 30 days of your purchase.

US colleges are trying to install location tracking apps on students’ phones

US colleges are trying to install location tracking apps on students’ phones

What the reports do agree on: the app uses local Bluetooth signals, not GPS, so it’s probably not going to be very useful to track students outside of school.

Survey finds majority of Americans are concerned about data collection by governments and companies

Survey finds majority of Americans are concerned about data collection by governments and companies

The thing about internet tracking and surveillance is that when it comes to online privacy both companies and governments have been historically caught lying to the public or just straight up selling private data legally .

Mozilla Wants Young People to Consider ‘Ethical Issues’ Before Taking Jobs in Tech

Mozilla Wants Young People to Consider ‘Ethical Issues’ Before Taking Jobs in Tech

Anu Raghunathan, a math and mechanical engineering major at New York University and chair of the university’s Association of Computer Machinery (ACM) chapter told Motherboard she was surprised by the Mozilla reception of an event she organized at NYU in October, where students and expert panelists discussed ethical AI, discrimination against women in tech, and algorithimic bias.

There's nowhere to hide anymore: This AI can see around corners

There's nowhere to hide anymore: This AI can see around corners

Felix Heide/Princeton University Hiding behind a wall might not be practical for much longer thanks to new technology that uses artificial intelligence to see and even read around corners.The beam is bounced off a visible wall and onto a hidden object behind a corner.

The Secretive Company That Might End Privacy as We Know It

The Secretive Company That Might End Privacy as We Know It

If you change a privacy setting in Facebook so that search engines can’t link to your profile, your Facebook photos won’t be included in the database, he said.Mr. Ton-That then took my photo with the app.

FBI used Graykey to unlock an iPhone 11 Pro, which was previously thought to be the most secure iPhone

FBI used Graykey to unlock an iPhone 11 Pro, which was previously thought to be the most secure iPhone

Specifically, a product called Graykey was used in a case against Baris Ali Koch to unlock Koch’s iPhone – an iPhone 11 Pro. Graykey works by bypassing the timeout functionality in iOS and allows for brute forcing of the passcode or password.

New security system to revolutionise privacy

New security system to revolutionise privacy

A new uncrackable security system created by researchers at the University of St Andrews, King Abdullah University of Science and Technology (KAUST) and the Center for Unconventional Processes of Sciences (CUP Sciences) is set to revolutionise communications privacy.

China facial-recognition case puts Big Brother on trial

China facial-recognition case puts Big Brother on trial

In a recent article posted online that generated wide discussion in China, Lao Dongyan, a law professor at prestigious Tsinghua University in Beijing, called abuse of facial recognition data "a deal with the devil".

Tracking College Students Everywhere They Go On Campus Is The New Normal

Tracking College Students Everywhere They Go On Campus Is The New Normal

One company that uses school WiFi networks to monitor movements says it gathers 6,000 location data points per student every day.How anyone is supposed to determine a student's mental health by non-stop location tracking isn't explained, but the article says schools are adding "risk factors" like, um, not going to the library enough.

Samsung smart TVs are set to upload screenshots of what you’re watching

Samsung smart TVs are set to upload screenshots of what you’re watching

If you enable Samsung’s IBA (Internet Based Advertising) service, your TV viewing history will be siphoned up and sent back to Samsung to be shared with third parties that pay Samsung to send advertising directly to your screen.

Should colleges really be putting smart speakers in dorms?

Should colleges really be putting smart speakers in dorms?

However, there are plenty of people on campus who see a dark side.“When it comes to deploying listening devices where sensitive conversations occur, we simply have no idea what long-term effect having conversations recorded and kept by Amazon might have on their futures—even, quite possibly, on their health and well-being,” says Russell Newman, an Emerson professor who researches the political economy of communication and communications policy.

Apple explains location seeking behavior on iPhone 11 Pro

Apple explains location seeking behavior on iPhone 11 Pro

Apple has released a detailed explanation of the privacy invading location seeking behavior observed on the iPhone 11 Pro by security researcher Brian Krebs.However, it isn’t yet approved for use in all countries and locations so the iPhone 11 Pro’s Ultra Wideband technology includes a phone home to check.

IPhone 11 Pro phones home with user location even when told not to

IPhone 11 Pro phones home with user location even when told not to

Security researcher Brian Krebs recently showed that the iPhone 11 Pro tracks users’ location even when explicitly told not to.Brian Krebs has sent follow up questions to Apple and we will provide updates on this iPhone 11 Pro privacy issue as it unfolds.

Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser Light

Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser Light

According to experiments done by a team of researchers from Japanese and Michigan Universities, a remote attacker standing at a distance of several meters away from a device can covertly trigger the attack by simply modulating the amplitude of laser light to produce an acoustic pressure wave.

Popular Android phones can be tricked into snooping on their owners

Popular Android phones can be tricked into snooping on their owners

“The impact of these attacks ranges from sensitive user information exposure to complete service disruption,” said Syed Rafiul Hussain and Imtiaz Karim, two co-authors of the research, in an email to TechCrunch.

You Got a Brain Scan at the Hospital. Someday a Computer May Use It to Identify You.

You Got a Brain Scan at the Hospital. Someday a Computer May Use It to Identify You.

The only privacy protection for subjects so far has been the fact that researchers who want to access data from the study have to sign agreements saying that they will not try to identify participants.

South African court rules that mass surveillance by the government is illegal

South African court rules that mass surveillance by the government is illegal

Previously, the South African government has used a law called RICA (Regulation of Interception of Communications and Provision of Communication Related Information Act 70 of 2002) to justify mass surveillance programs.

Consumer Surveillance Enters Its Bargaining Phase

Consumer Surveillance Enters Its Bargaining Phase

Mona Sloane is a professor at the Tandon School of Engineering at New York University, where she researches ethical-design principles in engineering and artificial intelligence.Those business models, some scholars argue, often become tech companies’ ethics, shaping how they design their products.

What the first porta-potty can teach designers about digital privacy

What the first porta-potty can teach designers about digital privacy

“Physical and digital privacy are more closely aligned than different, but data is abstracted from a person or community,” explains University of Florida associate professor Jasmine McNealy.What do we call this era of digital privacy?