Clubhouse Replied: No Hack Involved, Personal Data is Publicly Available

Clubhouse Replied: No Hack Involved, Personal Data is Publicly Available

While the risks are still valid and not fixed, the personal data of 1.3 million Clubhouse users has been posted online on a popular hacker forum, according to a Saturday report from Cyber News.

Facebook Had Years to Fix the Flaw That Leaked 500M Users’ Data

Facebook Had Years to Fix the Flaw That Leaked 500M Users’ Data

That incident differs from the more recent Facebook controversy, in which attackers were able to "scrape” Facebook by enumerating batches of possible phone numbers from more than 100 countries, submitting them to the contact import tool, and manipulating it to return the names, Facebook IDs, and other data users had posted on their profiles.

Facebook’s CEO Mark Zuckerberg Phone Number Leaked; Uses Signal App

Facebook’s CEO Mark Zuckerberg Phone Number Leaked; Uses Signal App

A security researcher, allegedly with access to leaked data reveals, Mark Zuckerberg uses the Signal app.Users switched to Signal app over privacy concerns with the Whatsapp policy that is stated to come into effect from May 2021.The database of private information and stolen phone numbers of 533M Facebook users was posted to the Hackers forum and is publically accessible.

Wi-Fi devices set to become object sensors by 2024 under planned 802.11bf standard

Wi-Fi devices set to become object sensors by 2024 under planned 802.11bf standard

SENS is envisioned as a way for devices capable of sending and receiving wireless data to use Wi-Fi signal interference differences to measure the range, velocity, direction, motion, presence, and proximity of people and objects.

Apple, Google Both Track Mobile Telemetry Data, Despite Users Opting Out

Apple, Google Both Track Mobile Telemetry Data, Despite Users Opting Out

Mobile device-tracking by Apple and Google take center stage in a report revealing that, despite both allowing users to opt out of sharing telemetry data – they do anyway.

Eye tracking can reveal an unbelievable amount of information about you

Eye tracking can reveal an unbelievable amount of information about you

"Our analysis of the literature," reads the paper's abstract, "shows that eye tracking data may implicitly contain information about a user’s biometric identity, gender, age, ethnicity, body weight, personality traits, drug consumption habits, emotional state, skills and abilities, fears, interests, and sexual preferences.".

Research shows Google collects 20x more data from Android than Apple collects from iOS [U]

Research shows Google collects 20x more data from Android than Apple collects from iOS [U]

A Google spokesperson told Ars Technica that the company disagrees with this research as it considers essential that both iOS and Android devices send and receive data to the companies behind them, which helps them keep their software up to date and check that everything is working as expected.

Google collects 20 times more telemetry from Android devices than Apple from iOS

Google collects 20 times more telemetry from Android devices than Apple from iOS

Leith from Trinity College at the University of Dublin, analyzed traffic originating from iOS and Android devices heading to Apple and Google servers at various stages of a phone’s operation, such as data shared: on first startup following a factory reset;when a SIM is inserted/removed;when a handset lies idle;when the settings screen is viewed;when location is enabled/disabled;when the user logs in to the pre-installed app store.

Smartphones share our data every four and a half minutes, says study

Smartphones share our data every four and a half minutes, says study

He said the devices not only collected data about handset activity, but also about handsets nearby; when a user connects to a wifi network the WiFi MAC addresses of other devices on the network are sent to Apple.

Personal data of Line users in Japan disclosed to Chinese development firm

Personal data of Line users in Japan disclosed to Chinese development firm

Line, whose app is used by over 86 million people in Japan, says in its data protection guideline that customers' personal information can be transferred overseas.The app operator said it had reported the matter to the government's Personal Information Protection Commission and will soon set up a third-party panel to investigate the incident.

2020 was a ‘record-breaking’ year in US school hacks, security failures

2020 was a ‘record-breaking’ year in US school hacks, security failures

This disruption continues, and while the report acknowledges the "heroic" efforts of IT staff, the analysis also says that "school district responses to the COVID-19 pandemic also revealed significant gaps and critical failures in the resiliency and security of the K-12 educational technology ecosystem.".

How to poison the data that Big Tech uses to surveil you

How to poison the data that Big Tech uses to surveil you

In a new paper being presented at the Association for Computing Machinery’s Fairness, Accountability, and Transparency conference next week, researchers including PhD students Nicholas Vincent and Hanlin Li propose three ways the public can exploit this to their advantage: Data strikes , inspired by the idea of labor strikes, which involve withholding or deleting your data so a tech firm cannot use it—leaving a platform or installing privacy tools, for instance.

Thousands of Android and iOS Apps Leak Data From the Cloud

Thousands of Android and iOS Apps Leak Data From the Cloud

Zimperium ran automated analysis on more than 1.3 million Android and iOS apps to detect common cloud misconfigurations that exposed data.

Research finds 14% of mobile apps leave user data in unsecured servers

Research finds 14% of mobile apps leave user data in unsecured servers

App developers rely on third-party servers to simplify data storage, but new research indicates that these servers are often left with little to no security over sensitive data.The issue lies in developers who do not secure their server, so any and all app categories are affected.

How Apple's locked down security gives extra protection to the best hackers

How Apple's locked down security gives extra protection to the best hackers

But the 1% of top hackers are going to find a way in and, once they’re inside, the impenetrable fortress of the iPhone protects them.”Bill Marczak, Citizen Lab. Despite these difficulties, Stortz says, modern computers are converging on the lockdown philosophy—and he thinks the trade-off is worth it.

Chinese spyware code was copied from America's NSA: researchers

Chinese spyware code was copied from America's NSA: researchers

WASHINGTON (Reuters) - Chinese spies used code first developed by the U.S. National Security Agency to support their hacking operations, Israeli researchers said on Monday, another indication of how malicious software developed by governments can boomerang against their creators.

Microsoft Teams AI could tell you who is most enjoying your video call

Microsoft Teams AI could tell you who is most enjoying your video call

Microsoft has developed an artificial intelligence for its Teams videoconferencing software that aims to put people presenting a remote talk more at ease by highlighting the most positive audience reactions.

New browser-tracking hack works even when you flush caches or go incognito

New browser-tracking hack works even when you flush caches or go incognito

Researchers from the University of Illinois, Chicago said in a new paper that most browsers cache the images in a location that’s separate from the ones used to store site data, browsing history, and cookies.

Security experts Can Now Break Encryption that Protects People’s Data Using Quantum Computing

Security experts Can Now Break Encryption that Protects People’s Data Using Quantum Computing

Using the "quantum annealing" method, the company said its research found that even the strongest versions of the advanced encryption standard may be decodable by quantum computers that could be available a few years from now.

Computer-stored encryption keys are not safe from side-channel attacks

Computer-stored encryption keys are not safe from side-channel attacks

In the paper Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (PDF), the researchers explain how they determine decryption keys for mathematically-secure cryptographic schemes by capturing information about secret values inside the computation taking place in the computer.

Browser ‘Favicons’ Can Be Used as Undeletable ‘Supercookies’ to Track You Online

Browser ‘Favicons’ Can Be Used as Undeletable ‘Supercookies’ to Track You Online

According to a researcher, though, these icons can also be a security vulnerability that could let websites track your movement and bypass VPNs, incognito browsing status, and other traditional methods of cloaking your movement online.

Telegram feature exposes your precise address to hackers

Telegram feature exposes your precise address to hackers

Advertisement A proof-of-concept video the researcher sent to Telegram showed how he could discern the address of a People Nearby user when he used a free GPS spoofing app to make his phone report just three different locations.

The company that processes payments for Amazon and Swiggy has reported a data leak of over 100 million debit and credit cardholders

The company that processes payments for Amazon and Swiggy has reported a data leak of over 100 million debit and credit cardholders

In what could be a major data breach, information of over 100 million debit and credit card users from payments processor Juspay has leaked on the dark web.

Where next for ethical data and data privacy? (Includes interview)

Where next for ethical data and data privacy? (Includes interview)

Kingston begins his analysis by focusing on the importance of data privacy and its continuing trajectory, noting: “Driven by the number of data breaches and the continued systematic misuse of personal data from large corporations, consumer data privacy and its control will be a major focus in 2021.

Exfiltrating Remaining Private Information from Donated Devices

Exfiltrating Remaining Private Information from Donated Devices

Here is a breakdown of all the devices I purchased: Device Type Number of Devices Bought Desktop or laptop computer 41 Removable media (such as flash drives and memory cards) 27 Hard disk 11 Cell phone 6 After buying the devices, I took them to my command center (a cool name for my basement) and began the data extraction process.

As a result of Covid-19, virtual classrooms have become the norm for many: what are the privacy implications?

As a result of Covid-19, virtual classrooms have become the norm for many: what are the privacy implications?

Instead, universities should recognize that significant user issues tend to surface only after educators and students have used the platforms and create processes to collect those issues and have the software developers rapidly fix the problems.

BMW Will Publicly Shame Out-of-Warranty Drivers with Smart Billboards and License Plate Readers

BMW Will Publicly Shame Out-of-Warranty Drivers with Smart Billboards and License Plate Readers

New smart billboards in the United Kingdom will read BMW owners' license plates and broadcast to the world if they think your BMW's warranty has expired, reports Motoring Research .When a stopped BMW that's older than 35 months is detected, the billboard will call out that car with a "personalized" message that just happens to be broadcast to everyone within sight of the billboard.

DHS warns of data theft risk when using Chinese products

DHS warns of data theft risk when using Chinese products

The US Department of Homeland Security (DHS) warned American businesses of the data theft risks behind using equipment and data services provided by companies linked with the People’s Republic of China (PRC).

Menstruation apps store excessive information, privacy charity says

Menstruation apps store excessive information, privacy charity says

Eva Blum-Dumontet, a senior researcher at Privacy International, who used five apps and then asked what information was held about her using a data subject access request, said reading the findings was “chilling” and “it makes us realise just how much data those apps actually collect, store and sometimes share with others.”.

Google told its scientists to 'strike a positive tone' in AI research - documents

Google told its scientists to 'strike a positive tone' in AI research - documents

A senior Google manager reviewing a study on content recommendation technology shortly before publication this summer told authors to “take great care to strike a positive tone,” according to internal correspondence read to Reuters.