Can you give away your fingerprints in a photo?

Can you give away your fingerprints in a photo?

Going to such lengths to protect your fingerprints might seem extreme, but incentives to bypass biometric security are growing as it increasingly shows up in everything from smartphones to door locks.“As biometrics become more prevalent in the authentication process, motivated attackers will definitely find innovative ways to bypass them,” said Vivek Chudgar, senior director at Mandiant, a consulting arm of cybersecurity firm FireEye. But some experts say harvesting fingerprints from pictures requires some specific conditions.

The Jack Bauers of Europe love facial recognition

The Jack Bauers of Europe love facial recognition

The mayor’s report called for a new regulations that would allow the technology’s roll-out in time for the 2024 Paris Olympics, noting that facial recognition was in a legal gray zone, somewhere between narrow data protection requirements and broader national security laws.

Secret F.B.I. Subpoenas Scoop Up Personal Data From Scores of Companies

Secret F.B.I. Subpoenas Scoop Up Personal Data From Scores of Companies

Because so few gag orders have been reviewed and rescinded, it isn’t possible to say whether the companies that received the most termination letters also received the most national security letters.

Two Widely Used Ad Blocker Extensions for Chrome Caught in Ad Fraud Scheme

Two Widely Used Ad Blocker Extensions for Chrome Caught in Ad Fraud Scheme

AdBlock by AdBlock, Inc — over 800,000 users uBlock by Charlie Lee — over 850,000 users Though these extensions were fully working as any other adblocker does by removing ads from web pages a user visits, the researchers caught them performing " Cookie Stuffing " as an ad fraud scheme to generate revenue for their developers.

Thousands of Google Calendars Possibly Leaking Private Information Online

Thousands of Google Calendars Possibly Leaking Private Information Online

Also, the issue is really not new, instead it was first raised 12 years ago when Google added this “make it public” feature to its web-based calendar service as a cool way for users to discover exciting events through the search engines, but a few quick searches revealed sensitive corporate information that was inadvertently made public using Google Calendar.

Personal Data Of Entire 16.6 Million Population Of Ecuador Leaked Online

Personal Data Of Entire 16.6 Million Population Of Ecuador Leaked Online

Now the dynamic duo has, with the help of ZDNet reporter Catalin Cimpanu, exposed one of the most mind-boggling security blunders to date: the leaking of personal information about what is thought to be the entire population of Ecuador.

Data on almost every Ecuadorean citizen leaked

Data on almost every Ecuadorean citizen leaked

The pair said they had found the 18GB of data spread across a variety of files saved on an unsecured server set up and run by Novaestrat - an Ecuadorean marketing and analytics company.

Google Warns LastPass Users Were Exposed To ‘Last Password’ Credential Leak

Google Warns LastPass Users Were Exposed To ‘Last Password’ Credential Leak

Project Zero has just disclosed that a security vulnerability left some of those 16 million users exposed to the risk of credential compromise as, in an ironic twist, LastPass could leak the last password used to any website visited.

Snoops can bypass iOS 13 lock screen to eyeball your address book. Apple hasn't fix it yet. Valid flaw? You decide

Snoops can bypass iOS 13 lock screen to eyeball your address book. Apple hasn't fix it yet. Valid flaw? You decide

Video Apple's very latest version of iOS appears to have the same sort of lock-screen bypass that plagued previous versions of the iThing firmware.

North Carolina County Loses $1.7 Million to BEC Scam

North Carolina County Loses $1.7 Million to BEC Scam

The scammers impersonated a building contractor that was constructing a new high school in the County and succeeded in redirecting a $2.5 million payment to their account.Advanced email security solutions such as SpamTitan can identify and block these BEC threats.

How Much Responsibility Should Monster.com Take for Third Party Data Breach?

How Much Responsibility Should Monster.com Take for Third Party Data Breach?

While noted that they are not responsible for data sold to third parties, the California Consumer Privacy Act will require that companies provide customers with the right to opt out of selling their personal information to third parties.

NSA: Fear The Future  -  Nefarious Laboratories

NSA: Fear The Future - Nefarious Laboratories

Mr. Gerstell peppers his letter with references to privacy, "wrestling with the challenges of the Fourth Amendment" in "this area of data privacy between the government and the private sector", tiptoeing around the truth: the mission of the National Security Agency is not, and will never be, to preserve citizen privacy.

More than half of UK businesses not GDPR compliant

More than half of UK businesses not GDPR compliant

The report, which surveyed companies of all sizes across a variety of sectors, suggests mid-size companies (those with 250-999 employees) are the worst compliant, with 39.5 percent reporting full GDPR compliance, compared with 56 percent of large and 51 percent of small companies, Egress said.

Weakness in Intel chips lets researchers steal encrypted SSH keystrokes

Weakness in Intel chips lets researchers steal encrypted SSH keystrokes

Now, researchers are warning that, in certain scenarios, attackers can abuse DDIO to obtain keystrokes and possibly other types of sensitive data that flow through the memory of vulnerable servers.

Instagram’s own posts are not as private as you think

Instagram’s own posts are not as private as you think

This is done from a series of mouse clicks on any web browser to reveal the static URL of posts and private stories cached on servers.

Google Finally Confirms Security Problem For 1.5 Billion Gmail And Calendar Users

Google Finally Confirms Security Problem For 1.5 Billion Gmail And Calendar Users

Google is finally working on a fix for a security problem that leaves more than a billion Calendar users exposed to attack.The threat actors craft their messages to include a malicious link, leveraging the trust that user familiarity with calendar notifications brings with it.

AI-powered cameras become new tool against mass shootings

AI-powered cameras become new tool against mass shootings

Police, retailers, stadiums and Fortune 500 companies are also using intelligent video.“What we’re really looking for are those things that help us to identify things either before they occur or maybe right as they occur so that we can react a little faster,” Hildreth said.

Concerns About Light Phone II

Concerns About Light Phone II

- Where are your policies regarding all of the above (with emphasis on device data privacy) posted for potential owners to review?.Without formal policies and safeguards, device owners will be exposed to data privacy risks and legal uncertainty.

Data in 2019, more valuable than oil

Data in 2019, more valuable than oil

With data, we can limit the amount of data we provide moving forward and in terms of social media, limit the number of people we “friend.”.There is an expectation that the data shared with banks, hospitals, credit card companies, and the like are protected at the highest level possible.

Monster.com says a third party exposed user data but didn’t tell anyone

Monster.com says a third party exposed user data but didn’t tell anyone

An exposed web server storing résumés of job seekers — including from recruitment site Monster — has been found online.“Because customers are the owners of this data, they are solely responsible for notifications to affected parties in the event of a breach of a customer’s database.”.

China hacked Asian telcos to spy on Uighur travelers: sources

China hacked Asian telcos to spy on Uighur travelers: sources

As part of the campaign, different groups of Chinese hackers have compromised telecoms operators in countries including Turkey, Kazakhstan, India, Thailand and Malaysia, the four sources said.

A huge database of Facebook users’ phone numbers found online

A huge database of Facebook users’ phone numbers found online

Each record contained a user’s unique Facebook ID and the phone number listed on the account.TechCrunch verified a number of records in the database by matching a known Facebook user’s phone number against their listed Facebook ID.

Exclusive: Messaging app Telegram moves to protect identity of Hong Kong protesters

Exclusive: Messaging app Telegram moves to protect identity of Hong Kong protesters

WASHINGTON (Reuters) - Telegram, a popular encrypted messaging app, will allow users to cloak their telephone numbers to safeguard Hong Kong protesters against monitoring by authorities, according to a person with direct knowledge of the effort.

South African authorities admit to mass surveillance

South African authorities admit to mass surveillance

This was revealed in the former State Security Agency Director General Arthur Fraser's affidavit and other documents filed in 2017 during a court case relating to amaBhungane Centre for Investigative Journalism - a South African non-profit investigative journalism organisation.

Russell Stover Chocolates hit by data breach - what customers need to know

Russell Stover Chocolates hit by data breach - what customers need to know

Candymaker Russell Stover Chocolates announced Friday that a recent data security breach at its stores potentially affected the information of customers’ credit and debit cards.If a consumer suspects an unauthorized charge, they should immediately notify the bank or financial institution that issued the payment card.”.

Google says hackers have put ‘monitoring implants’ in iPhones for years

Google says hackers have put ‘monitoring implants’ in iPhones for years

An unprecedented iPhone hacking operation, which attacked “thousands of users a week” until it was disrupted in January, has been revealed by researchers at Google’s external security team.Google said it had reported the security issues to Apple on 1 February.

Malicious websites were used to secretly hack into iPhones for years, says Google

Malicious websites were used to secretly hack into iPhones for years, says Google

Security researchers at Google say they’ve found a number of malicious websites which, when visited, could quietly hack into a victim’s iPhone by exploiting a set of previously undisclosed software flaws.

Google Will Now Pay Anyone Who Reports Apps Abusing Users' Data

Google Will Now Pay Anyone Who Reports Apps Abusing Users' Data

In the wake of data abuse scandals and several instances of malware app being discovered on the Play Store, Google today expanded its bug bounty program to beef up the security of Android apps and Chrome extensions distributed through its platform.

Presbyterian Healthcare Services Reports Data Security Breach

Presbyterian Healthcare Services Reports Data Security Breach

Presbyterian Healthcare Services (PHS) issued a statement on its website acknowledging a data security incident from early May that affected more than 180,000 patients.

A major security breach raises a key question: what happens when your biometric data is exfiltrated from a system?

A major security breach raises a key question: what happens when your biometric data is exfiltrated from a system?

As the researchers note, anyone who had found this database could use those admin passwords to take over a high-level BioStar 2 account with all user permissions and full clearances, and make changes to the security settings in an entire network.