>4,000 Android apps silently access your installed software

>4,000 Android apps silently access your installed software

More than 4,000 Google Play apps silently collect a list of all other installed apps in a data grab that allows developers and advertisers to build detailed profiles of users, a recently published research paper found.

Hackers are targeting your kids to infect Android and Chromebook devices with malware

Hackers are targeting your kids to infect Android and Chromebook devices with malware

Security investigators from Check Point Research discovered 56 malware-infected Google Play apps.Before Google had a chance to pull them down, users already downloaded the apps one million times; 24 of those apps, Check Point Research discovered, targeted children.Hazum told Laptop Mag how Google Play users can protect themselves from Tekya malware.

Web Cache Deception Attacks are Still Around, Says New Research

Web Cache Deception Attacks are Still Around, Says New Research

Web Cache Deception Attacks are Still Around, Says New Research.Web Cache Deception attacks are still impacting many popular websites, says new research.Researchers noticed that 25 of the Alexa Top 5,000 websites were impacted by the Web Cache Deception attack.

Study ranks the privacy of major browsers. Here are the findings

Study ranks the privacy of major browsers. Here are the findings

The study found the default Brave settings provided the most privacy, with no collection of identifiers allowing the tracking of IP addresses over time and no sharing of the details of webpages visited with backend servers.

Researchers expose vulnerabilities of password managers

Researchers expose vulnerabilities of password managers

Senior author of the study, Dr. Siamak Shahandashti from the Department of Computer Science at the University of York, said: "Vulnerabilities in password managers provide opportunities for hackers to extract credentials, compromising commercial information or violating employee information.

Research Finds Microsoft Edge Has Privacy-Invading Telemetry

Research Finds Microsoft Edge Has Privacy-Invading Telemetry

While Microsoft Edge shares the same source code as the popular Chrome browser, it offers better privacy control for users.This list is the checked by the browser and if any data needs to be sent to Google's servers, will only send a hashed partial URL fingerprint that can be used to track browsing behavior.

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

Hospitals Outdated Operating Systems Might Leave Patients Data at Risk!

The research was conducted by Palo Alto Networks , a cybersecurity firm, it revealed that 83% devices ran on outdated services that can’t even be updated even when it contains several loopholes that hackers can easily bypass and exploit.

Do You Own Your Data?

Do You Own Your Data?

Discussion Questions: Since some entities (like corporations) do treat personal data as a commodity, for now, should we still demand that individuals be given a way to share in the distribution of the material benefits from the use/selling of such data?

GoodRx Saves Money on Meds—It Also Shares Data With Google, Facebook, and Others

GoodRx Saves Money on Meds—It Also Shares Data With Google, Facebook, and Others

To determine how GoodRx shares data, we monitored traffic using a data packet-capturing tool to observe the company's Android mobile app and website as we searched for deals on a number of prescription medications.

Street-Level Surveillance

Street-Level Surveillance

EFF’s “Street-Level Surveillance” project shines light on the advanced surveillance technologies that law enforcement agencies routinely deploy in our communities.Every day, the threats to our rights expand as police use surveillance technologies to compile enormous databases filled with our personal information.

Conservative News Sites Track You Lots More Than Left-Leaning Ones

Conservative News Sites Track You Lots More Than Left-Leaning Ones

Popular right-leaning outlets analyzed by the researchers placed 227 cookies in a user's browser, versus 131 for the median popular left-leaning counterparts., the most popular right-leaning site, placed around 4 percent more cookies in women's browsers than , the most popular left-leaning site as categorized by BuzzFeed.

Chinese government deploys coronavirus tracking app to help curb outbreak

Chinese government deploys coronavirus tracking app to help curb outbreak

According to China’s National Health Commission, close contact refers to someone who has come in close distance, with no effective protection, with confirmed cases, suspected cases or mild cases while the person was ill or showed symptoms of being ill.

How Big Companies Spy on Your Emails

How Big Companies Spy on Your Emails

Motherboard has also obtained documentation that provides more specifics about how two other popular apps—Cleanfox and Slice—sell products based on users' emails to corporate clients.

Mental health websites don't have to sell your data. Most still do.

Mental health websites don't have to sell your data. Most still do.

For example, the page dedicated to treatments for depression on French health website Eurekasante contacts an astounding 71 third parties (compared to 36 in our first research) as soon as you open the page.

Breach at Indian Airline Affects 1.2 Million Passengers

Breach at Indian Airline Affects 1.2 Million Passengers

Using a brute-force attack, the researcher busted into an unencrypted database backup file containing the private information of more than 1.2 million passengers who flew with SpiceJet last month.

Fuck off Google! - Let's kick Google and co. out of our Lives and Spaces!

Fuck off Google! - Let's kick Google and co. out of our Lives and Spaces!

As a diverse multitude we can organize to resist and kick Google & co.Please contact us to suggest additions or modification of content, submit documents and proposals for research and action.Feel also free to participate by gardening our wiki.PARTICIPATE IN OUR WIKI.

Personal identification - People can now be identified at a distance by their heartbeat

Personal identification - People can now be identified at a distance by their heartbeat

The stress of telling a falsehood can alter someone’s heartbeat, so it could improve lie-detection technology, according to Wang Chen-chia, an engineer at Brimrose, another firm working on heartprint vibrometry.

There's nowhere to hide anymore: This AI can see around corners

There's nowhere to hide anymore: This AI can see around corners

Felix Heide/Princeton University Hiding behind a wall might not be practical for much longer thanks to new technology that uses artificial intelligence to see and even read around corners.The beam is bounced off a visible wall and onto a hidden object behind a corner.

The Military Is Building Long-Range Facial Recognition That Works in the Dark

The Military Is Building Long-Range Facial Recognition That Works in the Dark

The Army Research Lab has previously publicized research in this area, but these contracts, which started at the end of September 2019 and run until 2021, indicate the technology is now being actively developed for use in the field.“Sensors should be demonstrable in environments such as targets seen through automotive windshield glass, targets that are backlit, and targets that are obscured due to light weather (e.g., fog),” the Department of Defense indicated when requesting proposals.

Researchers warn census privacy efforts may muddy federal data

Researchers warn census privacy efforts may muddy federal data

The policy change came after Census Bureau research found that an attacker could isolate almost half of the respondents using public data, allowing them to be cross referenced with commercially available medical data, purchasing information and the like.

Let’s Reverse Engineer Discord

Let’s Reverse Engineer Discord

After encrypting the entire stream and sending with an RTP header, we can see this packet received and decrypted by our remote Discord client which is in a debugger.

New security system to revolutionise privacy

New security system to revolutionise privacy

A new uncrackable security system created by researchers at the University of St Andrews, King Abdullah University of Science and Technology (KAUST) and the Center for Unconventional Processes of Sciences (CUP Sciences) is set to revolutionise communications privacy.

TikTok on the clock, and the hacking won't stop: SMS spoofing vuln let baddies twiddle teens' social media videos

TikTok on the clock, and the hacking won't stop: SMS spoofing vuln let baddies twiddle teens' social media videos

TikTok, a mobile video app popular with teens, was vulnerable to SMS spoofing attacks that could have led to the extraction of private information, according to infosec researchers.Research from Israeli outfit Check Point found that an attacker could send a spoofed SMS message to a user containing a malicious link.

Let’s take back control of our events! #JoinMobilizon

Let’s take back control of our events! #JoinMobilizon

At this point, we are not talking about software, code or graphics yet: we are still focusing on the uses, the reality of organizing events and the real problems faced by the people who set them up.

Dr. Max Welling on Federated Learning and Bayesian Thinking

Dr. Max Welling on Federated Learning and Bayesian Thinking

The other thing is that with Bayesian update , if you have a very wide posterior distribution, then you know that parameter is not going be very important for making predictions.

267 Million Names And Phone Numbers Leaked Online — And They’re All From Facebook

267 Million Names And Phone Numbers Leaked Online — And They’re All From Facebook

Recently, a security researcher named Bob Diachenko found a database of user account info including their name and phone numbers for 267 million Facebook users.There’s no new information about how users can find out if their data was hacked and if the database is still being shared on hacker forums.

Revealed: NHS England bosses meet with tech and pharmaceutical giants to discuss price list of millions of Brits' medical data

Revealed: NHS England bosses meet with tech and pharmaceutical giants to discuss price list of millions of Brits' medical data

NHS Digital said in an “opportunity overview” document, seen by The Register , that it has the “foundations” to create an England-wide “single, national, standardised, event-based longitudinal record for 65 million citizens within two years,” that as well as being vital for “effective, efficient and safe patient care,” will service the “delivery data and insights to medical research organisations in the NHS, academia and Life Services.”.

New Intel CPU Vulnerability Puts Protected Data At Risk

New Intel CPU Vulnerability Puts Protected Data At Risk

Intel CPUs are at the center of controversy once again as yet another vulnerability is discovered by Cybersecurity researchers.According to their findings, the security vulnerability can compromise SGX (software guard extensions) protected by undervolting the CPU when executing protected computations, to the degree that the SGX memory encryption failed to protect data.

Chinese residents worry about rise of facial recognition

Chinese residents worry about rise of facial recognition

China was ranked the worst of 50 surveyed countries in a study looking at how extensively and invasively biometric ID and surveillance systems are being deployed.China has more facial recognition cameras than any other country and they are often hard to avoid.

China is using DNA samples to try to re-create the faces of Uighurs

China is using DNA samples to try to re-create the faces of Uighurs

The news: Chinese researchers are using blood taken from Uighurs to try to work out how to use a DNA sample to re-create an image of a person’s face, according to an investigation by the New York Times.