Consumer Reports warns IoT camera makers to improve their security

Consumer Reports warns IoT camera makers to improve their security

Consumer Reports has sent a letter to 25 manufacturers of IoT cameras with a call to improve their security.Consumer Reports warns the IoT camera manufacturers that its ratings will reflect whether it believes adequate steps have been taken to ensure the security and privacy of users is protected.

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

The FBI Got Data From A Locked iPhone 11 Pro Max—So Why Is It Demanding Apple Unlock Older Phones?

LightRocket via Getty ImagesQuestions are being asked about the FBI’s motivations over demanding Apple help it unlock the iPhones of the Pensacola shooting suspect, after Forbes uncovered a search warrant that strongly indicates the feds have access to a tool that can grab data on the latest, and most secure, iPhones.

What if everyone just said 'Nah' to tracking?

What if everyone just said 'Nah' to tracking?

Of this, it's reported that nine were requests for advertising, while more than ninety tried to send data off to "analytics" sites.Late last year, the New York Times ran its own analytics - on a leak of mobile location data - de-anonymising it, then identifying government officials.

Over 120 million X-Rays, CT scans exposed on the internet due to carelessness of hospitals: Report

Over 120 million X-Rays, CT scans exposed on the internet due to carelessness of hospitals: Report

Confidential personal health data belonging to millions of Indians are lying exposed on the internet because hospitals and medical institutions have not taken security precautions to safeguard this information.

Microsoft Outsourced Skype, Cortana Voice Analysis to China With Virtually No Security in Place: Report

Microsoft Outsourced Skype, Cortana Voice Analysis to China With Virtually No Security in Place: Report

A man walks past Google offices in Beijing in 2014.Photo: Greg Baker/AFP (AP)Microsoft had “no security measures” on a program that had humans transcribe user voice recordings from its Skype video calling service and Cortana assistant, the Guardian reported on Friday, even when those workers were located in China.

Skype audio graded by workers in China with 'no security measures'

Skype audio graded by workers in China with 'no security measures'

A Microsoft programme to transcribe and vet audio from Skype and Cortana, its voice assistant, ran for years with “no security measures”, according to a former contractor who says he reviewed thousands of potentially sensitive recordings on his personal laptop from his home in Beijing over the two years he worked for the company.

Lifelabs Data Breach, the Largest Ever in Canada, May Cost the Company Over $1 Billion in Class-Action Lawsuit

Lifelabs Data Breach, the Largest Ever in Canada, May Cost the Company Over $1 Billion in Class-Action Lawsuit

An October hack of medical testing company LifeLabs exposed the sensitive personal information of an estimated 15 million Canadians.The LifeLabs data breach included lab test results and national health card numbers along with personally identifiable information including names, dates of birth, home addresses and email addresses.

NitroPad: Secure Laptop With Unique Tamper Detection

NitroPad: Secure Laptop With Unique Tamper Detection

Thanks to the combination of the open source solutions Coreboot, Heads and Nitrokey USB hardware, you can verify that your laptop hardware has not been tampered with in transit or in your absence (so-called evil maid attack).

Wyze camera data leak: How to secure your account right now

Wyze camera data leak: How to secure your account right now

Passwords and payment information weren't included in the exposed database, but to be proactive and ensure user accounts remained private, Wyze signed everyone out and reset all third-party connections to its services, such as Alexa and Google Assistant.

Get yourself cybersecure for 2020

Get yourself cybersecure for 2020

“Most of the answers to security questions like these are easily acquired by hackers,” Tom Lysemose Hansen, founder of mobile app security vendor Promon, explains, “using simple trial-and-error methods based on LinkedIn, Facebook, Twitter and even Wikipedia data, which give away much of our personal and family details.” Indeed, it’s incredible, and incredibly worrying, what a simple Google search can uncover.

#Privacy: Pharmacy fined £275K for GDPR violation

#Privacy: Pharmacy fined £275K for GDPR violation

“Regardless of the exact number of care homes involved, given the volume of documentation and size of Doorstep Dispensaree’s business, it appears likely that hundreds and possibly even thousands of data subjects have been affected,” read the notice.

Tories switch to messaging app Signal after WhatsApp leaks

Tories switch to messaging app Signal after WhatsApp leaks

The Conservative party has started using the secure messaging service Signal for its internal communications with Tory MPs, following years of leaks from WhatsApp groups.Killock said: “It’s great to hear that Conservative MPs are learning about the virtues of Signal and secure private communications.

Private internet owner mulling plans for privacy suite in 2020

Private internet owner mulling plans for privacy suite in 2020

This comprehensive plan which we have started implementing we hope will lead the way to other companies in this space to follow suite and create a “no need for trust” echo system where all our stakeholders will be able to verify how our system works and handles information.

Firefox Announces New Partner in Delivering Private and Secure DNS Services to Users

Firefox Announces New Partner in Delivering Private and Secure DNS Services to Users

NextDNS Joins Firefox’s Trusted Recursive Resolver Program Committing to Data Retention and Transparency Requirements that Respect User Privacy.Firefox announced a new partnership with NextDNS to provide Firefox users with private and secure encrypted Domain Name System (DNS) services through its Trusted Recursive Resolver Program.

Firms and governments use the internet to spy on us. Should we care?

Firms and governments use the internet to spy on us. Should we care?

In the internet era, invasions of privacy come from two main directions.Second, governments and other public bodies have begun to take advantage of the tools of mass surveillance the internet provides in the name of better public security.

Offering software for snooping to governments is a booming business

Offering software for snooping to governments is a booming business

But some, including NSO Group, as well as Gamma Group (an Anglo-German firm) and Hacking Team (an Italian one which in April merged with another company to create Memento Labs), sell software to help governments access online data on persons of interest.

Filmmakers sue State Department over social media surveillance rules

Filmmakers sue State Department over social media surveillance rules

Earlier this month, the Department of Homeland Security revealed that it wanted to expand facial recognition usage to encompass identifying US citizens as they enter and exit the US, although it backed off this decision under criticism.

Cliqz Search as an Onion Service

Cliqz Search as an Onion Service

We’re great fans of the Tor Project that offers a private, anonymous and secure way to access the Internet with their browser and decentralized network.As a first step, we’re super proud to release our beta search as a Tor onion service.

Amazon admits it has enacted zero civil liberties protections as part of surveillance doorbell partnerships

Amazon admits it has enacted zero civil liberties protections as part of surveillance doorbell partnerships

Amazon has confirmed that civil rights organizations were correct about the threats Ring technology and police partnerships pose to privacy and civil liberties in statements to U.S. Senator Edward Markey.

Twitter now lets you enable 2FA without asking for your phone number

Twitter now lets you enable 2FA without asking for your phone number

Back when Twitter relied on SMS to send users their six-digit 2FA codes this requirement made more sense, but now that it allows them use authentication apps or security keys, however, asking for phone numbers is increasingly unnecessary.

How smart homes could be wiser

How smart homes could be wiser

Fortunately, because of the known risks, many developers, security experts, consumer groups and policy makers are working on solutions to make smart homes wiser.Beyond privacy and security, seek wiser smart home devices.

Amazon Admits It Has Enacted Zero Civil Liberties Protections as Part of Surveillance Doorbell Partnerships

Amazon Admits It Has Enacted Zero Civil Liberties Protections as Part of Surveillance Doorbell Partnerships

WASHINGTON - Amazon has confirmed that civil rights organizations were correct about the threats Ring technology and police partnerships pose to privacy and civil liberties in statements to U.S. Senator Edward Markey.

Browsers and privacy

Browsers and privacy

The following browsers were tested: Firefox 70.0.1 (Mozilla Binaries from MX Linux) Firefox ESR 68.2.0 (Debian package) Chromium 78.0.3904.97 (Debian Package) Brave Browser 1.0.0 (Package from Brave web site) Epiphany 3.32.1.2 (Debian package) Midori 7.0 (Debian package) The method itself was relatively simple.

New 5G flaws can track phone locations and spoof emergency alerts

New 5G flaws can track phone locations and spoof emergency alerts

Last week, the researchers found several security flaws in the baseband protocol of popular Android models — including Huawei’s Nexus 6P and Samsung’s Galaxy S8+ — making them vulnerable to snooping attacks on their owners.

Wire Business Update

Wire Business Update

Wire stands by its mission to best protect communication data with state-of-the-art technology and practice: All source code has been and will be available for inspection on GitHub ().Wire believes that data protection is best achieved through state-of-the-art encryption and continues to innovate in that space with Messaging Layer Security (MLS).

10,331,579,614 Records Leaked in 2019 And Counting...

10,331,579,614 Records Leaked in 2019 And Counting...

The data breach to Capital One servers in March exposed the personal information of nearly 106 million of the bank's customers and applicants from 2005 up to 2019.

The Fear of Biometric Technology in Today’s Digital World

The Fear of Biometric Technology in Today’s Digital World

With access to biometric data, hackers can easily steal someone’s identity or even use and tamper the private information that could be detrimental to someone’s life.The security issues regarding biometric data focus on how sensitive information is captured, stored, processed, transmitted, and accessed.

Amazon Ring doorbells exposed home Wi-Fi passwords to hackers

Amazon Ring doorbells exposed home Wi-Fi passwords to hackers

Bitdefender said the Amazon-owned doorbell was sending owners’ Wi-Fi passwords in cleartext as the doorbell joins the local network, allowing nearby hackers to intercept the Wi-Fi password and gain access to the network to launch larger attacks or conduct surveillance.

Chand Rajendra-Nicolucci: Stop blaming encryption

Chand Rajendra-Nicolucci: Stop blaming encryption

To combat this, governments argue that companies need to create ways for law enforcement to access encrypted data when they need it — through backdoors.A narrow solution that protects privacy and security while providing law enforcement access when appropriate is not impossible as tech companies often argue.

Microsoft's Secured-Core PC Feature Protects Critical Code

Microsoft's Secured-Core PC Feature Protects Critical Code

Microsoft already offers Windows Secure Boot, a feature that checks for cryptographic signatures to confirm software integrity.Instead of relying on firmware, Microsoft has worked with AMD, Intel, and Qualcomm to make new central processing unit chips that can run integrity checks during boot in a controlled, cryptographically verified way.