Over 100 million IoT devices and servers are vulnerable because of 20-year-old TCP/IP stacks

Over 100 million IoT devices and servers are vulnerable because of 20-year-old TCP/IP stacks

In context: Security researchers at Forescout and JSOF have uncovered a set of nine vulnerabilities within four commonly used TCP/IP stacks.However, Forescout created an open-source script to help administrators track down vulnerable IoT devices and servers on the network.

Update on beta testing payments in Signal

Update on beta testing payments in Signal

Signal has often been asked if we can build something to support this kind of payments use case for a better alternative future (one that isn’t dominated by big tech).

Going Against Google Analytics With Plausible’s Co-Founder [Interview]

Going Against Google Analytics With Plausible’s Co-Founder [Interview]

Google has created many useful products that improved the lives of many people all around the world but in recent years Google has changed their priorities and now it’s all about optimizing value for their shareholders, squeezing even more money and further dominating the web.

Another 500 million accounts have leaked online, and LinkedIn’s in the hot seat

Another 500 million accounts have leaked online, and LinkedIn’s in the hot seat

“No private member account data from LinkedIn was included” “We have investigated an alleged set of LinkedIn data that has been posted for sale and have determined that it is actually an aggregation of data from a number of websites and companies,” reads LinkedIn’s statement.

How Deeper Network Leverages Decentralization for Better Privacy

How Deeper Network Leverages Decentralization for Better Privacy

The Deeper Connect acts as a decentralized private network (DPN), allowing you to circumvent censorship, participate in bandwidth sharing, and mine on a blockchain, all while protecting you against cyberattacks.

UK may compel Facebook to share users data and conversations with police

UK may compel Facebook to share users data and conversations with police

The UK parliament is considering forcing to implement backdoors to share access to messages from its chat services to the police.To compel Facebook to share the access of messages to the police, the Ministry would use a special measure, a technical capability notice.

Boston Dynamics Introduces Stretch: A New Robot For Moving Boxes

Boston Dynamics Introduces Stretch: A New Robot For Moving Boxes

Boston Dynamics has been showing interest in the logistics space since 2019 when it purchased Kinema Systems, a company that makes machine vision software for robots in warehouses.

Smartphones share our data every four and a half minutes, says study

Smartphones share our data every four and a half minutes, says study

He said the devices not only collected data about handset activity, but also about handsets nearby; when a user connects to a wifi network the WiFi MAC addresses of other devices on the network are sent to Apple.

Best Practices for preventing IoT Security Camera Hacks

Best Practices for preventing IoT Security Camera Hacks

Botnets can include PCs with viruses or IoT (internet of things) devices like smart thermostats or security cameras that have malware or have such easy access to their administration accounts, that they can be collectively controlled by remote code execution.

New 5G protocol vulnerabilities allow location tracking

New 5G protocol vulnerabilities allow location tracking

Security researchers have identified new vulnerabilities in the 5G protocol that could be abused to crash network segments and extract user data, such as location information.

How to use random hardware addresses

How to use random hardware addresses

Use random hardware addresses for all networks: Select the Start button, then select Settings > Network & Internet > Wi-Fi .Use random hardware addresses for a specific network: Select the Start button, then select Settings > Network & Internet > Wi-Fi > Manage known networks .

Privacy Talks: Interview with Micah Lee from The Intercept

Privacy Talks: Interview with Micah Lee from The Intercept

Timestamp Links & Questions: [0:50] – Could you tell us a little bit about what you do in your position as Director of Information Security at First Look Media, the organization behind The Intercept?

This AI Uses Your Brain Activity to Create Fake Faces It Knows You’ll Find Attractive

This AI Uses Your Brain Activity to Create Fake Faces It Knows You’ll Find Attractive

Developed by a team from the University of Helsinki and Copenhagen University, the artificially intelligent system was able to generate images of fake faces that it knew particular users would find attractive—because those same users’ brain activity played a part in training the AI.

New Browser Attack Allows Tracking Users Online With JavaScript Disabled

New Browser Attack Allows Tracking Users Online With JavaScript Disabled

Although these methods exploit a covert timing channel in the CPU cache, the new attack devised by Ben-Gurion researchers targets a cache-based side-channel in modern web browsers.This string search is followed by a request for a CSS element that requires DNS resolution from the malicious server.

Algorithmic bias: how automated decision making has become an assault on privacy – and what to do about it

Algorithmic bias: how automated decision making has become an assault on privacy – and what to do about it

Even worse is a growing tendency for such automated decision-making systems to draw on highly personal data as a matter of routine.First, it is vital for people to know what classes of personal data are being used for decision making.

Wombo.AI: What the ‘deepfake singing’ app is really doing with your photos

Wombo.AI: What the ‘deepfake singing’ app is really doing with your photos

All a person needs to do to turn someone into a singer is download the app, choose their image or take a new one, pick a song from a limited list, and then let the app do the work.

Saleforce's LinkedIn hacked to show BLM support after employees speak out - TheGrio

Saleforce's LinkedIn hacked to show BLM support after employees speak out - TheGrio

A pair of Black former employees recently came forward to express their frustration while working at the software giant Salesforce.A hacker breached the LinkedIn account of the software giant Salesforce during the CPAC conference last Friday, posting a supportive message about Black Lives Matter from the page.

Privacy Talks | Interview with Robin Wilton from Internet Society

Privacy Talks | Interview with Robin Wilton from Internet Society

[] – Without getting too technical, why is quantum computing a threat to encryption and how worried should we be?What are some other resources that you’d suggest for those looking to learn more about quantum computing?

A new browser extension blocks any websites that use Google, Facebook, Microsoft, or Amazon

A new browser extension blocks any websites that use Google, Facebook, Microsoft, or Amazon

The Economic Security Project is trying to make a point about big tech monopolies by releasing a browser plugin that will block any sites that reach out to IP addresses owned by Google, Facebook, Microsoft, or Amazon.

Technology and media entities join forces to create standards group aimed at building trust in online content

Technology and media entities join forces to create standards group aimed at building trust in online content

The formation of the C2PA brings together founding members of the Adobe-led Content Authenticity Initiative (CAI) and the Microsoft- and BBC-led Project Origin, unifying technical specifications under a single entity.

Firefox 86 Introduces Total Cookie Protection

Firefox 86 Introduces Total Cookie Protection

In combination with the Supercookie Protections we announced last month, Total Cookie Protection provides comprehensive partitioning of cookies and other site data between websites in Firefox.Total Cookie Protection is an evolution of the First-Party-Isolation feature, a privacy protection that is shipped in Tor Browser.

Privacy faces risks in tech-infused post-Covid workplace

Privacy faces risks in tech-infused post-Covid workplace

People returning to work following the long pandemic will find an array of tech-infused gadgetry to improve workplace safety but which could pose risks for long-term personal and medical privacy.

Why hot new social app Clubhouse spells nothing but trouble

Why hot new social app Clubhouse spells nothing but trouble

Users can listen in to conversations, interviews and discussions between interesting people on various topics – it is just like tuning in to a podcast, but live and with an added layer of exclusivity.”.

GitHub - ultrafunkamsterdam/AnonSurf: Change your IP address instantly - easy small GUI tool for Windows (linux soon)

GitHub - ultrafunkamsterdam/AnonSurf: Change your IP address instantly - easy small GUI tool for Windows (linux soon)

It changes your traffic's source origin address, which makes it harder to trace traffic to you.Change your IP address instantly - easy small GUI tool for Windows (linux soon).Please respect their work and do not misuse the tool.

K-9 Mail is looking for funding

K-9 Mail is looking for funding

Only a few developers working on the project in their spare time wasn’t enough to keep up with the pace of the Android platform.Since right now there’s mainly one person working on the app this is currently not an issue for the K-9 Mail project.

Biden Wants to Shut Down Credit Bureaus – What Would That Mean for You?

Biden Wants to Shut Down Credit Bureaus – What Would That Mean for You?

(To watch Roy’s track record, click here) Roy is broadly in line with the rest of Wall Street, which has assigned SWKS 13 Buy ratings and 7 Holds over the past three month -- and sees the stock growing about 15% over the next 12 months, to a target price of $205.69.

Firefox 85 Cracks Down on Supercookies

Firefox 85 Cracks Down on Supercookies

In Firefox 85, we’re introducing a fundamental change in the browser’s network architecture to make all of our users safer: we now partition network connections and caches by the website being visited.Trackers can abuse caches to create supercookies and can use connection identifiers to track users.

How law enforcement gets around your smartphone’s encryption

How law enforcement gets around your smartphone’s encryption

At this point an attacker could find and exploit certain types of security vulnerabilities in iOS to grab encryption keys that are accessible in memory and decrypt big chunks of data from the phone.

Brave browser takes step towards enabling a decentralized web

Brave browser takes step towards enabling a decentralized web

Brave has just taken a step towards supporting a decentralized web, by becoming the first browser to offer native integration with a peer-to-peer networking protocol that aims to fundamentally change how the internet works.

70TB of Parler users’ data leaked by security researchers

70TB of Parler users’ data leaked by security researchers

Twitter user @donk_enby, who first announced about the scrape, claims that over a million video URLs, some deleted and private, were taken.This may include things from deleted/private posts.— crash override (@donk_enby).