Sensing the sensors

Sensing the sensors

Even the Camera application on my device can't access the sensors.Cometh Privacy Indicators , it does exactly what Apple's iOS does, show you an indicator whenever an application uses your device's camera or microphone.Do note that the application only shows indicator for the main camera sensor.

Report: 97% of Cybersecurity Companies Have Leaked Data on the Dark Web

Report: 97% of Cybersecurity Companies Have Leaked Data on the Dark Web

97% of companies have data leaks and other security incidents exposed on the Dark Web. 631,512 verified security incidents were found with over 25% (or 160,529) of those classed as a high or critical risk level+ containing highly sensitive information such as plaintext credentials or PII, including financial or similar data.

Personal information of roughly 46,000 veterans exposed in VA hack

Personal information of roughly 46,000 veterans exposed in VA hack

(CNN)The Department of Veterans Affairs said Monday that roughly 46,000 veterans had their personal information, including Social Security numbers, exposed in a data breach in which "unauthorized users" gained access to an online application used for making health care payments.

LinkedIn sued over allegation it secretly reads Apple users' clipboard content

LinkedIn sued over allegation it secretly reads Apple users' clipboard content

(Reuters) - Microsoft Corp’s (MSFT.O) LinkedIn was sued by a New York-based iPhone user on Friday for allegedly reading and diverting users’ sensitive content from Apple Inc’s (AAPL.O) Universal Clipboard application.

IOS 14: What do the orange and green dots in the status bar mean?

IOS 14: What do the orange and green dots in the status bar mean?

The green light being on does not mean that the camera feed is being recorded and saved; all iOS knows is that the app can access the camera feed at that time.

Turkish privacy watchdog launches probe into TikTok

Turkish privacy watchdog launches probe into TikTok

The Personal Data Protection Board (KVKK) has acted on its own motion to open an investigation against TikTok after security flaw reports appeared on media, the authority said in a statement on July 3.

Necessary measures to enhance privacy and protect data

Necessary measures to enhance privacy and protect data

Owners of devices equipped with the Apple Mac OS system can restrict ad tracking in the security/privacy range, and verify who receives system diagnostic data, and in the same range also can manage access rights to applications, and access to Internet services can be controlled under the Settings System / Internet Accounts.

New Hasty Attempt to Tackle Fake News in Brazil Heavily Strikes Privacy and Free Expression

New Hasty Attempt to Tackle Fake News in Brazil Heavily Strikes Privacy and Free Expression

Social networks and private messaging applications would be obliged to keep the chain of all communications that have been forwarded tracking all its nodes, regardless of the distribution of the content was done maliciously at the source or along the chain.

PrivacyBreacher for Android reveals data that apps have access to without extra permission requests

PrivacyBreacher for Android reveals data that apps have access to without extra permission requests

PrivacyBreacher demonstrates that applications may access information about a user's device without requesting any extra permissions.In the end, it is still important to know what applications may look up on a device without any extra permission requests.

Public support vital to contact tracing apps: Can NHSx provide this?

Public support vital to contact tracing apps: Can NHSx provide this?

Even a newly constructed app using the Apple-Google software API (something NHSx is working on) is unlikely to solve all the issues the app has encountered, and it’s questionable whether new version will incite the public support needed.

Infection Surveillance in the Name of Public Health

Infection Surveillance in the Name of Public Health

But could the government require a similar application in the United States or would it be a violation of the Fourth Amendment’s guarantee against “unreasonable searches?” Generally, the Fourth Amendment may be invoked when a search infringes on a reasonable expectation of privacy, or the government’s activity amounts to a trespass, per the Supreme Court’s holding in Katz v.

Twitter: we need a break.

Twitter: we need a break.

As Mastodon is designed to be a more privacy-conscious alternative to Twitter, the developers have very carefully mimicked certain aspects of Twitter’s UI/UX.Out of the vast selection of clients available, I am going to be using Tusky, and Pinafore on the web.

Is The Australian Government’s App COVIDSAFE, Safe for Me? This Person Says Most Likely.

Is The Australian Government’s App COVIDSAFE, Safe for Me? This Person Says Most Likely.

TL;DR — After a review of the application permissions, sign up form, and as well a PCAP Dump of the entire process and a review of the architecture.So for those not aware, during the sign-up process of COVIDSAFE you are asked a few questions.

Personal data of nearly 8,000 small business owners seeking relief loans may have been exposed to other applicants

Personal data of nearly 8,000 small business owners seeking relief loans may have been exposed to other applicants

The personal data of some small business owners seeking help via the Small Business Administration's Economic Injury Disaster Loan program may have been exposed to other applicants.The official said that 4 million small business owners applied for $383 billion in aid via the EIDL program and emergency grants.

Critics raise privacy concerns as France considers digital tracking to battle coronavirus

Critics raise privacy concerns as France considers digital tracking to battle coronavirus

In the mind of France’s Interior Minister, Christophe Castaner, there is no question: If an application can help fight the Covid-19 pandemic in France by alerting smartphone users that they have been close to a sick person, it should be used.

Justice Department audit finds widespread flaws in FBI surveillance applications

Justice Department audit finds widespread flaws in FBI surveillance applications

“We do not have confidence that the FBI has executed its Woods Procedures in compliance with FBI policy, or that the process is working as it was intended to help achieve the ‘scrupulously accurate’ standard for FISA applications,” Horowitz wrote in a “management advisory” addressed to FBI Director Chris Wray.

'Cybergulag': Russia looks to surveillance technology to enforce lockdown

'Cybergulag': Russia looks to surveillance technology to enforce lockdown

While the details of the new monitoring system have not been confirmed, official statements and leaked plans have indicated they could include mobile apps that track users’ location, CCTV cameras with facial recognition software, QR codes, mobile phone data and credit card records.

4 takeaways from the brutal new report on FBI surveillance

4 takeaways from the brutal new report on FBI surveillance

Justice Department inspector general Michael Horowitz issued interim findings of an ongoing review of Foreign Intelligence Surveillance Act (FISA) applications beyond the Page application.

The De-Googled Android Fork is Making Good Progress

The De-Googled Android Fork is Making Good Progress

Therefore, an idea came to mind: why not fork Android, remove all the Google features, even low level, such as connectivity check, DNS…, replace default apps with more virtuous apps, add basic online services, and integrate all this into a consistent form that could be used by Mum and Dad and any people without tech or expert knowledge?

App Used by Netanyahu's Likud Leaks Israel's Entire Voter Registry

App Used by Netanyahu's Likud Leaks Israel's Entire Voter Registry

The voter registry was uploaded by Likud to the Elector app, which is used by the party to manage Election Day. The firm that developed the application, Feed-b, commented that the vulnerability was a “one-off incident that was immediately dealt with," and that security measures have since been boosted.

How my application ran away and called home from Redmond

How my application ran away and called home from Redmond

After about a minute later we received Slack alert that the Beacon has managed to find a leak from the lab environment.I logged in to my Windows test machine to see if the Beacon is still running.

Over 750,000 applications for US birth certificate copies exposed online

Over 750,000 applications for US birth certificate copies exposed online

An online company that allows users to obtain a copy of their birth and death certificates from U.S. state governments has exposed a massive cache of applications — including their personal information.

Filmmakers sue State Department over social media surveillance rules

Filmmakers sue State Department over social media surveillance rules

Earlier this month, the Department of Homeland Security revealed that it wanted to expand facial recognition usage to encompass identifying US citizens as they enter and exit the US, although it backed off this decision under criticism.

$5B class action lawsuit accusing Apple of selling customer data is thrown out

$5B class action lawsuit accusing Apple of selling customer data is thrown out

A $5B class action lawsuit that accused Apple of selling customer data has been rejected for the second and final time.Patently Apple reports that the lawsuit, filed in May, alleged that Apple sold customer-identifying data relating to iTunes purchases.

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

“Our team found a way of manipulating specific actions and intents,” Erez Yalon, director of security research at Checkmarx said, “making it possible for any application, without specific permissions, to control the Google Camera app.

Vulnerability in WebEx and Zoom allows hackers to access their sessions

Vulnerability in WebEx and Zoom allows hackers to access their sessions

Vulnerability testing specialists point out that any web application that uses numeric or alphanumeric identifiers is exposed to enumeration attacks.

The application ZAO sparked criticism on privacy issues

The application ZAO sparked criticism on privacy issues

An earlier version of the user agreement for the application stated that consumers who carry their images to ZAO agree to hand over their intellectual property rights to their faces, while allowing the application to use their images for marketing purposes.

Apple accidentally reopens security flaw in latest iOS version

Apple accidentally reopens security flaw in latest iOS version

Stefan Esser, an iPhone security expert, tweeted an additional warning: “I hope people are aware that with a public jailbreak being available for the latest iOS 12.4 people must be very careful what apps they download from the Apple AppStore.

How to disable OK Google and Google Assistant on Android devices

How to disable OK Google and Google Assistant on Android devices

If OK Google or Google Assistant are active on your Android device but you are not using these tools, you may want to consider disabling those.Here is how you disable OK Google on your device:Open the Google application on the Android device.

State Department now requires U.S. visa applicants to share social media accounts

State Department now requires U.S. visa applicants to share social media accounts

The new visa application forms list a number of social media platforms, including Facebook, Twitter and YouTube and require the applicant to provide any account names they may have had on them over the previous five years.