Facial recognition is making its way to cruise ships

Facial recognition is making its way to cruise ships

Like some airlines, Royal Caribbean has started to roll out facial recognition and other technologies to streamline its boarding process. As people churn through the line faster with mobile boarding passes and facial recognition, the rest of the line benefits as well—that 90-minute wait will average more like 20 minutes for even those passengers boarding the old-fashioned way.

SHA-1 Has One Foot In the Grave

SHA-1 Has One Foot In the Grave

Last week, researchers Gaëtan Leurent and Thomas Peyrin released a paper detailing improvements to the original SHAttered project that theoretically allow chosen-plaintext attacks against SHA-1. A fully-functional version of this type of attack was demonstrated in 2009 with a dramatic improvement to chosen-prefix attacks for the MD5 hash algorithm.

London’s Tube network to switch on wi-fi tracking by default in July

London’s Tube network to switch on wi-fi tracking by default in July

To deliver data of the required detail, TfL says detailed digital mapping of all London Underground stations was undertaken to identify where wi-fi routers are located so it can understand how commuters move across the network and through stations.

The Most Expensive Lesson Of My Life: Details of SIM port hack

The Most Expensive Lesson Of My Life: Details of SIM port hack

The attacker ports your SIM card to a phone that they control. Once the attacker controls your primary email account, they begin to move laterally across any lucrative online services that you manage via that email address (bank accounts, social media accounts, etc.).

Millions of Golfers Land in Privacy Hazard After Cloud Misconfig

Millions of Golfers Land in Privacy Hazard After Cloud Misconfig

Unfortunately, Game Golf landed its users in a sand trap of privacy concerns by not securing the database: Security Discovery senior security researcher Jeremiah Fowler said that the bucket included all of the aforementioned analyzer information, plus profile data like usernames and hashed passwords, emails, gender, and Facebook IDs and authorization tokens.

Tails - Tails 3.14 is out

Tails - Tails 3.14 is out

To fix this issue: Reinstall your USB stick using the same installation method. If you don't need installation or upgrade instructions, you can directly download Tails 3.14: For USB sticks (USB image) For DVDs and virtual machines (ISO image) What's coming up?

Here's What To Do Because You Can't Trust Hotels With Your Personal Data

Here's What To Do Because You Can't Trust Hotels With Your Personal Data

Then, last month, a report by the cybersecurity software company Symantec revealed that a majority of hotels inadvertently leak guests' personal data to third parties when they send out confirmation emails.

DHS warns of 'strong concerns' that Chinese-made drones are stealing data

DHS warns of 'strong concerns' that Chinese-made drones are stealing data

Washington (CNN) — Chinese-made drones may be sending sensitive flight data to their manufacturers in China, where it can be accessed by the government there, the US Department of Homeland Security warned in an alert issued Monday obtained by CNN.

How (and Why) to Change Your DNS Server

How (and Why) to Change Your DNS Server

Here's the thing: The servers that route your internet requests don't understand domain names like . It turns out that my ISP-supplied router, which brings me internet, TV, and phone service, does not permit me to change the DNS settings.

The False Promise of “Lawful Access” to Private Data

The False Promise of “Lawful Access” to Private Data

Governments in the G7 and around the world need to resist this seemingly benign request from their law enforcement establishments, and resolve instead to make sure that their citizens have the best tool to protect them: strong encryption, from end to end, deployed widely, to defend the society against its attackers.

'WhatsApp will never be safe': Telegram boss attacks Facebook-owned messaging app

'WhatsApp will never be safe': Telegram boss attacks Facebook-owned messaging app

A huge security flaw with WhatsApp that compromised the privacy of 1.5 billion users this week will not be the last and may not even be the worst incident of its kind, the founder of rival messaging app Telegram has warned.

Your landlord is watching

Your landlord is watching

These forms of smart home and surveillance technology can only fuel the existing problem of landlords, especially in New York City, harassing and evicting tenants in order to raise rent prices.

Don't Put Anonymous Speech on the Chopping Block

Don't Put Anonymous Speech on the Chopping Block

Farrell and Schneier propose greater transparency as one means of strengthening democracy against information attacks that undermine trust. Chilling legitimate participation and reducing the diversity of opinions voiced would not fix the broken public comment process.

The best privacy-focused browsers in 2019

The best privacy-focused browsers in 2019

img: Data-Protection-Word-Cloud.jpegBoth of these social media giants are relying on ads for profits: Google is using Chrome browser and Google search engine to provide you with better ads while Facebook is pushing them straight to your newsfeed.

How Hackers Broke WhatsApp With Just a Phone Call

How Hackers Broke WhatsApp With Just a Phone Call

But a new Financial Times report alleges that the notorious Israeli spy firm NSO Group developed a WhatsApp exploit that could inject malware onto targeted phones—and steal data from them—simply by calling them.

China’s Digital Wall Around Tibet

China’s Digital Wall Around Tibet

Echoing methods which have already been used to control Uyghurs in Xinjiang, the Chinese government has tightened its grip around Tibet by securing an already nearly impassable border with drones, facial recognition and radar.

How RPA can Fast Track Personal Data Protection Compliance

How RPA can Fast Track Personal Data Protection Compliance

Before we go into details of how implementing RPA can help fast track Data Protection compliance, let us understand the current state of Data Protection and Privacy Laws in the Middle East, some of the challenges faced and the role of RPA.

It’s Almost Impossible to Tell if Your iPhone Has Been Hacked

It’s Almost Impossible to Tell if Your iPhone Has Been Hacked

Jonathan Levin, a researcher who has written books about iOS and macOS internals and security and provides training on iPhone security, said that in his opinion, so few iOS zero-days have been caught because they are worth a lot of money, and thus more likely to be used in targeted attacks.

IARPA Needs More Training Data for Video Surveillance Algorithms

IARPA Needs More Training Data for Video Surveillance Algorithms

The training data would improve the tech’s ability to link together footage from a large network of security cameras, allowing it to better track and identify potential targets.

Hospitals Failing on Security Hygiene

Hospitals Failing on Security Hygiene

Healthcare organizations (HCOs) are increasingly at risk from legacy operating systems, device complexity and the use of commonly exploited protocols, according to a new study from Forescout.

New Intel CPU Flaws Expose VMs and Clouds to Full Takeover – Introducing RIDL, ZombieLoad and Fallout

New Intel CPU Flaws Expose VMs and Clouds to Full Takeover – Introducing RIDL, ZombieLoad and Fallout

While existing attacks target information at specific addresses, RIDL operates akin to a passive sniffer that eavesdrops on in-flight data (e.g., data in the line fill buffers) flowing through CPU components.

WhatsApp Users Under Surveillance Attack

WhatsApp Users Under Surveillance Attack

It is confirmed that hackers have been able to remotely install surveillance software on phones and other devices, by taking advantage of a major flaw in what they discovered in messaging app, WhatsApp. WhatsApp is one of Facebook’s family apps, and Facebook’s challenges with privacy and data breaches has been a matter of public show over the last couple of months, as such, this goes on to add to the larger corporate entity’s headaches.

San Francisco Bans Facial Recognition Use by Police and the Government

San Francisco Bans Facial Recognition Use by Police and the Government

San Francisco just became the first city in the nation to ban the use of facial recognition technology by police and government agencies. Rosenberg does worry about an uptick in neighborhood surveillance, she said, but is pleased that the bill will stop facial recognition technology from misidentifying people as criminal suspects in real-time policing.

Yes, Americans can opt-out of airport facial recognition — here’s how

Yes, Americans can opt-out of airport facial recognition — here’s how

After all, it’s not Customs and Border Protection collecting your facial recognition data directly — it’s the airlines — and they pass it on to the government. If you’re a U.S. citizen, you can opt out by telling an officer or airline employee at the time of a facial recognition scan.

WhatsApp exploit let attackers install government-grade spyware on phones

WhatsApp exploit let attackers install government-grade spyware on phones

“WhatsApp encourages people to upgrade to the latest version of our app, as well as keep their mobile operating system up to date, to protect against potential targeted exploits designed to compromise information stored on mobile devices,” the company said in a statement.

Heedless of warnings,people don’t change passwords

Heedless of warnings,people don’t change passwords

As said by Jan Oetjen, the Managing Director of GMX “It’s important for everyone to take the security of their email accounts seriously, as these are at the center of our digital lives.

Why You Should Drop Google and Start Using Private Search Engines

Why You Should Drop Google and Start Using Private Search Engines

The average internet user might not have heard of Google alternatives like Naver or Baidu, let alone a new family of search engines specifically dedicated to privacy. In comes Qwant, an encrypted search engine that works like Google but keeps zero logs.

Data Protection, Security, and the GDPR: A fuzzy and fraught relationship

Data Protection, Security, and the GDPR: A fuzzy and fraught relationship

First a look at: 1.1 The media backdrop 1.2 The Crux: a.k.a what the GDPR really says about security 1.3 Security as source of privacy risks: security as a legitimate interest, IP addresses as personal data, and profiling in a security context.

Panic as panic alarms meant to keep granny and little Timmy safe prove a privacy fiasco

Panic as panic alarms meant to keep granny and little Timmy safe prove a privacy fiasco

But researchers at Fidus Information Security discovered, and revealed on Friday, that the system has a dangerous flaw: you can send a text message to the SIM and force it to reset.

Microsoft Confirms Intent To Replace Windows 10 Passwords For 800 Million Users

Microsoft Confirms Intent To Replace Windows 10 Passwords For 800 Million Users

Microsoft's crypto, identity and authentication team group manager, Yogesh Mehta, has made an announcement that he says puts "the 800 million people who use Windows 10 one step closer to a world without passwords."

More