Google's secret home security superpower: Your smart speaker with its always-on mics

Google's secret home security superpower: Your smart speaker with its always-on mics

"Your Nest speakers and displays will notify you if a critical sound is detected, like a smoke alarm or glass breaking, by sending an alert to the Home app," the company wrote in a blog post.

COVID-19 contact tracing applications are privacy snares, Defcon

COVID-19 contact tracing applications are privacy snares, Defcon

COVID contact tracing apps boast the power of gathering personal data that exposes your activities, movements, and relationships.Experts believe governments must avoid this data-hungry mindset in contact tracing apps.

The changing face of privacy in a pandemic

The changing face of privacy in a pandemic

China’s cavalier approach to privacy has seen the country deploy drones, artificial intelligence, and security cameras to enforce quarantines and monitor public spaces.There are two main approaches to contact tracing apps, and both versions rely on anonymized IDs to record interactions with nearby devices, which allows for complete privacy.

Hackers hit university online exam tool

Hackers hit university online exam tool

A data security breach involving an online examination tool used by Australian universities is under investigation."Any breach of security and privacy of this type is of course deeply concerning and we will continue to work with ProctorU to understand the circumstances of the breach and determine whether any follow-up actions are required on our part," the spokeswoman said.

Achilles: Small chip, big peril.

Achilles: Small chip, big peril.

In this research dubbed “ Achilles ” we performed an extensive security review of a DSP chip from one of the leading manufacturers: Qualcomm Technologies.Check Point Research decided not to publish the full technical details of these vulnerabilities until mobile vendors have a comprehensive solution to mitigate the possible risks described.

Redcar and Cleveland Attack Recovery Cost Over £10m

Redcar and Cleveland Attack Recovery Cost Over £10m

Whilst the council had industry standard tools deployed to secure its computer network at the time of the attack, which it said had been configured to provide optimum protection, it has since made additional improvements to its cyber-defenses, with further upgrades planned.

Peter Dutton confirms Australia could spy on its own citizens under cybersecurity plan

Peter Dutton confirms Australia could spy on its own citizens under cybersecurity plan

Dutton said law enforcement agencies would target terrorists, paedophiles and drug traffickers operating in the dark web – promising proposed new powers will apply “to those people and those people only”.

Now-fixed exploit used Microsoft Office macros to hack macOS

Now-fixed exploit used Microsoft Office macros to hack macOS

A now-fixed exploit in the macOS version of Microsoft Office may have allowed attackers to hack a Mac user just by getting them to open a document.

You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

You Gave Your Phone Number to Twitter for Security and Twitter Used it for Ads

In a blog post, the company said an 'error' in its 'Tailored Audiences and Partner Audiences advertising system' inadvertently used the information provided by users for security reasons to run targeted ads based on the advertisers' own marketing lists.

Google joins forces with ADT on smart home security push

Google joins forces with ADT on smart home security push

By teaming with an established player like ADT, Google's Nest has a much clearer path into the home, especially with consumers that don't want to fool with the hassle of setting up gear themselves.

New ‘unpatchable’ exploit allegedly found on Apple’s Secure Enclave chip, here’s what it could mean

New ‘unpatchable’ exploit allegedly found on Apple’s Secure Enclave chip, here’s what it could mean

All data stored on iPhone, iPad, Mac, Apple Watch, and other Apple devices is encrypted with random private keys, which are only accessible by the Secure Enclave.

Amazon says police demands for customer data have gone up

Amazon says police demands for customer data have gone up

Amazon has said the number of demands for user data made by U.S. federal and local law enforcement have increased more during the first half of 2020 than during the same period a year earlier.

Privacy News Online | Weekly Review: July 31, 2020

Privacy News Online | Weekly Review: July 31, 2020

The Privacy Shield framework, which allowed the large companies like Facebook to send data from Europe to the United States, has been ruled invalid by the Court of Justice.

Introducing IOTA Stronghold. Stronghold is a collection of…

Introducing IOTA Stronghold. Stronghold is a collection of…

There are many challenges involved in securely managing digital secrets like passwords, vehicle access codes, and wallet seeds:High-value secrets like private keys need to be encrypted at rest, using modern and secure algorithmsSuch secrets need to be purged from device memory immediately after useUsers must be able to configure systems to their security needsApplications need to run on any type of hardware from phones to cars, where possible leveraging Trusted Execution Environments.

Addressing the July 2020 e-commerce and marketing data breach — A Message From Ledger’s Leadership

Addressing the July 2020 e-commerce and marketing data breach — A Message From Ledger’s Leadership

A week after patching the breach, we discovered It had been further exploited on the 25th of June 2020, by an unauthorized third party who accessed our e-commerce and marketing database – used to send order confirmations and promotional emails – consisting mostly of email addresses, but with a subset including also contact and order details such as first and last name, postal address, email address and phone number.

Watching 👁️: Hong-kong Updates - China scares the world. · Berty Technologies

Watching 👁️: Hong-kong Updates - China scares the world. · Berty Technologies

As this new law is implemented, these companies could quickly find themselves forced to provide the Chinese government with this set of metadata to assist in the arrest of demonstrators and opponents of the regime.

Following security breach, report says Twitter contractors have been caught spying on accounts in the past

Following security breach, report says Twitter contractors have been caught spying on accounts in the past

In this recent attack in which 130 accounts were hacked, Twitter was able to confirm that the hackers got help from employees with access to an internal control panel.

Is It Safe to Own Used or Refurbished Phones? Here Are The Things You Should Know!

Is It Safe to Own Used or Refurbished Phones? Here Are The Things You Should Know!

Important things that you should know if you own a used or refurbished phone to avoid data privacy breach that might compromise your personal information.Every time hackers discover a new hole to exploit your device, the phone maker or manufacturer immediately fixes it by sending some updates.

Homeland Security Was Destined to Become a Secret Police Force

Homeland Security Was Destined to Become a Secret Police Force

In a press conference on Tuesday, Chad Wolf, the acting head of the Department of Homeland Security, responded to media reports that unidentified federal agents using unmarked vehicles have been arresting protesters in Portland, Oregon.

Exclusive: More than 1,000 people at Twitter had ability to aid hack of accounts

Exclusive: More than 1,000 people at Twitter had ability to aid hack of accounts

SAN FRANCISCO (Reuters) - More than a thousand Twitter employees and contractors as of earlier this year had access to internal tools that could change user account settings and hand control to others, two former employees said, making it hard to defend against the hacking that occurred last week.

US claims two Chinese hackers targeted defense companies, dissidents, and coronavirus research

US claims two Chinese hackers targeted defense companies, dissidents, and coronavirus research

The US Justice Department has charged two alleged Chinese hackers with stealing trade secrets and other valuable data from companies worldwide, including firms working on COVID-19 treatments and vaccines.

After Twitter Hack, Senator Asks Why DMs Aren't Encrypted

After Twitter Hack, Senator Asks Why DMs Aren't Encrypted

After hackers managed to take over a wave of high profile accounts on Twitter by leveraging access to an internal tool, Senator Ron Wyden is highlighting that the social network has not implemented end-to-encryption for direct messages, even though the company previously explored the idea.

Homeland Security fears widespread mask-wearing will break facial recognition software

Homeland Security fears widespread mask-wearing will break facial recognition software

Under the heading "Violent Adversaries Likely to Use Protective Masks to Evade Face Recognition Systems," the agency's bulletin warns that "violent extremists and other criminals who have historically maintained an interest in avoiding face recognition are likely to opportunistically seize upon public safety measures recommending the wearing of face masks to hinder the effectiveness of face recognition systems in public spaces by security partners.".

EU court cancels US data-sharing pact over snooping concerns

EU court cancels US data-sharing pact over snooping concerns

The European Union’s top court ruled Thursday, July 16, 2020 that an agreement that allows big tech companies to transfer data to the United States is invalid, and that national regulators need to take tougher action to protect the privacy of users' data.

TunnelBear Removes Hong Kong Servers

TunnelBear Removes Hong Kong Servers

Privacy and human rights organizations have expressed concerns that the new law gives the Chinese government legal means to force Hong Kong’s ISPs to turn over user data, or even make arrests over online content.

New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data

New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data

CyberNews received information from reader Jake Dixon, a security researcher with Vadix Solutions, who discovered an unsecured Amazon Simple Storage Solution (S3) database containing more than 31,000 images of users’ passports, driver’s licenses, evidence of age documents, and more.

Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks

Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks

The Central Intelligence Agency has conducted a series of covert cyber operations against Iran and other targets since winning a secret victory in 2018 when President Trump signed what amounts to a sweeping authorization for such activities, according to former U.S. officials with direct knowledge of the matter.

Private Internet Access shuts down VPN servers in Hong Kong due to new national security law

Private Internet Access shuts down VPN servers in Hong Kong due to new national security law

Private Internet Access, the world’s leading no log VPN service, is removing its physical Hong Kong servers because new national security laws in the region endanger the privacy of our users and all Hong Kong residents.

Records of 45 Million+ travelers to Thailand and Malaysia Leaked on Darkweb!!

Records of 45 Million+ travelers to Thailand and Malaysia Leaked on Darkweb!!

It is being analyzed by our Threat Researchers and will soon be indexed on our data breach monitoring and notification platform – people who’re concerned about their information exposure can register on the platform to ascertain the risks.

Inside America’s Secretive $2 Billion Research Hub Collecting Fingerprints From Facebook, Hacking Smartwatches And Fighting Covid-19

Inside America’s Secretive $2 Billion Research Hub Collecting Fingerprints From Facebook, Hacking Smartwatches And Fighting Covid-19

Among the government’s wilder Mitre orders: a prototype tool that can hack into smartwatches, fitness trackers and home thermometers for the purposes of homeland security; software to collect human fingerprints from social media websites like Facebook, Instagram and Twitter for the FBI; support in building what the FBI calls the biggest database of human anatomy and criminal history in the world; and a study to determine whether someone’s body odor can show they’re lying.