Can hardware ever be trusted? The Betrusted project aims to find out by going back to basics

Can hardware ever be trusted? The Betrusted project aims to find out by going back to basics

Betrusted is more than just a secure CPU – it is a system complete with screen and keyboard, because privacy begins and ends with the user.” Its aim is to create a secure communication device whose hardware can be trusted, and which does protect privacy.

Police arrested an innocent man for murder using Google location data

Police arrested an innocent man for murder using Google location data

Police then turned to Google to help them crack the case, issuing a warrant for geofence information on all the active accounts in the area at the time of the crime, according to a report from the Phoenix New Times.

Scottish police debuts portable 'cyber kiosks' that lets officers scan smartphones and laptops

Scottish police debuts portable 'cyber kiosks' that lets officers scan smartphones and laptops

The current process for reviewing on-device data could last for several months as devices were retrieved at crime scenes and sent to special labs for further analysis, which would leave both suspects, victims, and witnesses subject to the same frustrating wait times.‘The introduction of cyber kiosks will enable us to quickly identify if a device contains material related to an investigation,’ a video from the Scotland Police explains.

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

LightRocket via Getty ImagesQuestions are being asked about the FBI’s motivations over demanding Apple help it unlock the iPhones of the Pensacola shooting suspect, after Forbes uncovered a search warrant that strongly indicates the feds have access to a tool that can grab data on the latest, and most secure, iPhones.

Open Contacts  -  F-Droid - Free and Open Source Android App Repository

Open Contacts - F-Droid - Free and Open Source Android App Repository

read the contents of your shared storage.Allows the app to read the contents of your shared storage.Allows the app to write the contents of your shared storage.Allows the app to access the phone features of the device.

US Government-funded Android phones come preinstalled with unremovable malware

US Government-funded Android phones come preinstalled with unremovable malware

An Android phone subsidized by the US government for low-income users comes preinstalled with malware that can't be removed without making the device cease to work, researchers reported on Thursday.

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Android community worried about presence of “Chinese spyware” by Qihoo 360 in Samsung smartphones and tablets

Prompted by the post, many users noticed that the storage scanner in the Device Care section included a little note: “powered by 360.” Even in China, Qihoo 360 is well known for its past privacy transgressions and controversies and it’s understandable why Samsung users would be incredibly concerned that anything at all from Qihoo is preinstalled on their phone.

United States government-funded phones come pre-installed with unremovable malware

United States government-funded phones come pre-installed with unremovable malware

It’s with great frustration that I must write about yet another unremovable pre-installed malicious app found on the UMX U686CL phone: the mobile device’s own Settings app functions as a heavily-obfuscated malware we detect as Android/Trojan.

Get yourself cybersecure for 2020

Get yourself cybersecure for 2020

“Most of the answers to security questions like these are easily acquired by hackers,” Tom Lysemose Hansen, founder of mobile app security vendor Promon, explains, “using simple trial-and-error methods based on LinkedIn, Facebook, Twitter and even Wikipedia data, which give away much of our personal and family details.” Indeed, it’s incredible, and incredibly worrying, what a simple Google search can uncover.

Dr. Max Welling on Federated Learning and Bayesian Thinking

Dr. Max Welling on Federated Learning and Bayesian Thinking

The other thing is that with Bayesian update , if you have a very wide posterior distribution, then you know that parameter is not going be very important for making predictions.

Amazon Conference Badges Tracked Attendees' Movements

Amazon Conference Badges Tracked Attendees' Movements

Included in re:Invent's attendee badges was a small device acting as a Bluetooth beacon, which allowed AWS to track people as they moved from room to room.AWS confirmed to Motherboard this was the company behind the beacons, and added that attendees could opt-out if they wanted to.

Amazon and Google Are Practically Giving Away Smart Speakers. Here’s Why.

Amazon and Google Are Practically Giving Away Smart Speakers. Here’s Why.

Credit: NurPhoto/Getty ImagesThis holiday season, both Amazon and Google are selling their smart speakers for so little that they’re basically giving them away, or in some cases, partnering with other companies to actually give them away.

The iPhone 11 Pro’s Location Data Puzzler — Krebs on Security

The iPhone 11 Pro’s Location Data Puzzler — Krebs on Security

On Nov. 13, KrebsOnSecurity contacted Apple to report this as a possible privacy bug in the new iPhone Pro and/or in iOS 13.x, sharing a video showing how the device still seeks the user’s location when each app and system service is set to “never” request location information (but with the main Location Data service still turned on).

Privacy Analysis of Tiktok’s App and Website

Privacy Analysis of Tiktok’s App and Website

Hard to believe that this is covered by „legitimate interest“ and transparency: Entered search terms are sent to Facebook: Transfers to both companies break different rules of the GDPR: Facebook can’t fulfill Art. 14 (information, deletion etc.)

FBI warns that smart TV you just bought may be spying on you

FBI warns that smart TV you just bought may be spying on you

In addition to outlining how new advanced technological features risk allowing television manufacturers and app developers to snoop on consumers, the bureau says malicious cyber actors can also take control of unsecured smart TVs and potentially wreak havoc on unsuspecting owners.

This Ring Uses a Fake Fingerprint to Protect Your Biometric Data

This Ring Uses a Fake Fingerprint to Protect Your Biometric Data

Consumers increasingly rely on fingerprint and facial scans to unlock their electronic devices, but what happens if their biometric data ends up in the wrong hands?According to Kaspersky, a more ideal solution is to build protections inside electronic devices to prevent fingerprint or facial data from ever leaking.

Privacy features on iOS 13: Tips to help protect your privacy

Privacy features on iOS 13: Tips to help protect your privacy

iOS 13 allows you to switch Face ID/Touch ID on and off for: iPhone Unlock iTunes and App Store Apple Pay Password AutoFill Go to Settings > Face ID & Passcode (or Touch ID & Passcode on older iPhones), and enter your existing passcode to take control of this.

Could Law Enforcement Get Data From Alexa?

Could Law Enforcement Get Data From Alexa?

This was achieved on the 2nd generation version of the Echo Dot by Jessica Hyde of Magnet Forensics in 2017 using a method know as In-System Programming or ISP and allowed for the full extraction of data from the flash storage of the device.

Russia Bans Sale of Gadgets Without Russian-Made Software

Russia Bans Sale of Gadgets Without Russian-Made Software

Russia might make this law effective in the country by July 2020.To explain the motive of drafting and applying such law in Russia, the lawmakers and members of legislation have explained that the idea is to promote the widespread use of Russian software and endorse the technology.

Cops put GPS tracker on man’s car, charge him with theft for removing it

Cops put GPS tracker on man’s car, charge him with theft for removing it

A little more than a year ago, the state of Indiana charged a suspected drug dealer with theft for removing a government-owned GPS tracking device from his SUV.The case began in July 2018, when the Warrick County Sheriff's Office got a warrant to attach a GPS tracking device to Derek Heuring's car.

People getting rid of Fitbits after Google

People getting rid of Fitbits after Google

"With news of the acquisition of your company, I intend to sell my Fitbit & delete my account," said a tweet from Tanya Janca, which received several hundred retweets and likes.

How to Lock Down Your Health and Fitness Data

How to Lock Down Your Health and Fitness Data

Photograph: AppleSpeaking of deleting data, pick Devices from the previous menu, then choose a device from the list, and you can erase everything Apple Health holds on you with a couple of taps.

Federal court rules that the Fourth Amendment protects your laptops and smartphones from suspicionless searches at the border

Federal court rules that the Fourth Amendment protects your laptops and smartphones from suspicionless searches at the border

This court decision comes as a result of years of hard work by the ACLU, the ACLU of Massachusetts and the EFF on behalf of eleven international travelers who had been the recipient of suspicionless device searches when entering the United States.

Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser Light

Hackers Can Silently Control Your Google Home, Alexa, Siri With Laser Light

According to experiments done by a team of researchers from Japanese and Michigan Universities, a remote attacker standing at a distance of several meters away from a device can covertly trigger the attack by simply modulating the amplitude of laser light to produce an acoustic pressure wave.

Researchers hack Siri, Alexa, and Google Home by shining lasers at them

Researchers hack Siri, Alexa, and Google Home by shining lasers at them

While the researchers tested only Siri, Alexa, Google Assistant, Facebook Portal, and a small number of tablets and phones, the researchers believe all devices that use MEMS microphones are susceptible to Light Commands attacks.

Why hospitals are a weak spot in U.S. cybersecurity

Why hospitals are a weak spot in U.S. cybersecurity

"Cybercriminals know they are a soft target where they can access patient records and social security numbers and other information," Suzanne Schwartz, a deputy director in the FDA's device center, tells Axios.

Popular Android phones can be tricked into snooping on their owners

Popular Android phones can be tricked into snooping on their owners

“The impact of these attacks ranges from sensitive user information exposure to complete service disruption,” said Syed Rafiul Hussain and Imtiaz Karim, two co-authors of the research, in an email to TechCrunch.

Vulnerability In Ring Doorbells Left the Door Open for Hackers to Open the Door

Vulnerability In Ring Doorbells Left the Door Open for Hackers to Open the Door

Bitdefender–the tireless actuary of the Internet of Things–were able to crack into homeowner’s personal WiFi networks via Amazon’s Ring doorbells, the video-enabled auto-locks that allow homeowners to remotely open the door.Balan told us that the vulnerability was discovered following a request from PCMag to look into the device and that it’s now been patched.

Amazon Ring doorbells exposed home Wi-Fi passwords to hackers

Amazon Ring doorbells exposed home Wi-Fi passwords to hackers

Bitdefender said the Amazon-owned doorbell was sending owners’ Wi-Fi passwords in cleartext as the doorbell joins the local network, allowing nearby hackers to intercept the Wi-Fi password and gain access to the network to launch larger attacks or conduct surveillance.

Italian football league may use anti-terror listening devices to identify racist fans

Italian football league may use anti-terror listening devices to identify racist fans

Last week, during a Euro 2020 qualifier England players were subjected to monkey chants and Nazi salutes by Bulgaria fans .Now, football federation president Gabriele Gravina has given details of "a passive radar device that uses directional microphones to determine the source of the noise".