Kaspersky AV injected unique ID that allowed sites to track users, even in incognito mode

Kaspersky AV injected unique ID that allowed sites to track users, even in incognito mode

A case in point: for almost four years, AV products from Kaspersky Lab injected a unique identifier into the HTML of every website a user visited, making it possible for sites to identify people even when using incognito mode or when they switched between Chrome, Firefox, or Edge.

The U.S. military is using solar-powered balloons to spy on parts of the Midwest

The U.S. military is using solar-powered balloons to spy on parts of the Midwest

The purpose of the balloons according to that filing is to “conduct high altitude MESH networking tests over South Dakota to provide a persistent surveillance system to locate and deter narcotic trafficking and homeland security threats.”.

New research confirms Kazakhstan is spying on connections to Facebook, Twitter, VK, Instagram, Youtube, Google, and more

New research confirms Kazakhstan is spying on connections to Facebook, Twitter, VK, Instagram, Youtube, Google, and more

The full list of 37 sites identified by Censored Planet thus far are: On July 19th, a Kazakh government official tried to clarify that the installation of the fake certificate was not technically mandatory.

Kazakhstan tries and fails to MITM all of its internet users with rogue certificate installation

Kazakhstan tries and fails to MITM all of its internet users with rogue certificate installation

Officials from the Ministry of Digital Development, Innovation and Aerospace stated that the new rule was “aimed at enhancing the protection of citizens, government bodies and private companies from hacker attacks, Internet fraudsters and other types of cyber threats,” but that clearly doesn’t seem to be the case.

Kazakhstan begins intercepting citizens’ web traffic to ‘protect them from cyber threats’

Kazakhstan begins intercepting citizens’ web traffic to ‘protect them from cyber threats’

The Kazakhstan government has started to intercept all HTTPS traffic from all devices within its borders effective July 17, reports ZDNet. Local internet service providers (ISPs) have been instructed by the government to force their citizens to install a state-authorized certificate on all devices, and all browsers.

Google Announces DNS over HTTPS ‘General Availability’

Google Announces DNS over HTTPS ‘General Availability’

The move is an effort by Google to boost consumer privacy, reduce the threat of man-in-the-middle attacks, and speed up the internet with a new solution for securing domain name server traffic that uses the encrypted HTTPS channel.

List of Canada–United States border crossings

List of Canada–United States border crossings

Four Falls Brown Road New Brunswick East Road Russell Road Maine Canada still provides Customs services seasonally, but US-bound traffic is prohibited, and has been since the US border station closed in the 1960s.

Murder investigation opened after disappearance of Belgian backpacker in Australia

Murder investigation opened after disappearance of Belgian backpacker in Australia

Stillness in the heart of the city: thousands join in on Brussels Yoga Day. Motorcycles could ease traffic congestion, says automobile federation. Body of missing man found in Brussels canal. The world’s best vegan restaurant is in Brussels.

China Telecom Swallows Huge Amount of European Mobile Traffic For Over Two Hours

China Telecom Swallows Huge Amount of European Mobile Traffic For Over Two Hours

On Thursday, a major data center in Switzerland, Safe Host, leaked more than 70,000 routes to China Telecom, which in turn announced the routes on the global internet, causing huge amounts of traffic destined for European networks to be rerouted through its own servers.

For two hours, a large chunk of European mobile traffic was rerouted through China

For two hours, a large chunk of European mobile traffic was rerouted through China

But instead of ignoring the BGP leak, China Telecom re-announced Safe Host's routes as its own, and by doing so, interposed itself as one of the shortest ways to reach Safe Host's network and other nearby European telcos and ISPs. Mobile operators in France, Holland, Switzerland affected.

Texas governor signs state ban on red-light traffic cameras

Texas governor signs state ban on red-light traffic cameras

Texas Gov. Greg Abbott signed a law Saturday, June 1, 2019 that bans red-light traffic cameras in Texas. AUSTIN, Texas (AP) — Texas Gov. Greg Abbott has signed a bill into law banning red-light traffic cameras in the nation’s second-largest state.

Disclosing Tor users' real IP address through 301 HTTP Redirect Cache Poisoning

Disclosing Tor users' real IP address through 301 HTTP Redirect Cache Poisoning

The fact that it is possible to achieve certain persistency in browsers cache, by injecting poisoned entries, can be abused by an attacker to disclose real IP address of the Tor users that send non-TLS HTTP traffic through malicious exit nodes.

Easy ways to access blocked websites

Easy ways to access blocked websites

Surfshark is a good option for a VPN, since it has many fast servers worldwide and manages to bypass many restrictions put on the web, even the great Firewall of China. Source: simple way to bypass restrictions is to use a proxy.

Chinese driver gets ticket for scratching his face

Chinese driver gets ticket for scratching his face

Image copyright Sina Weibo Image caption A Chinese man's face scratch landed him a traffic fine and two points on his licence A man in eastern China received a fine after a traffic camera using artificial intelligence captured him scratching his face, it's reported.

Fast ways to increase online privacy

Fast ways to increase online privacy

And while it’s difficult to follow the research on what methods are the best for private, secure messaging, there are some basic principles that, when followed, keep you safer than not. The most basic quality of a secure chat is one that is end-to-end encrypted.

Court Throws out Lawsuit Against Tor for Providing Anonymous Routing

Court Throws out Lawsuit Against Tor for Providing Anonymous Routing

The parents of G.S. have brought suit against the website that sold the drug to G.S., the service provider that created the network through which G.S. was able to access the website on the dark web (Tor), and the mail service that sent the drug to G.S. Plaintiffs have brought claims for strict products liability, negligence, abnormally dangerous activity, and civil conspiracy.

Over 90% of data transactions on IoT devices are unencrypted

Over 90% of data transactions on IoT devices are unencrypted

Deepen Desai, VP of security research and operations at Zscaler, tells CSO that one of the worrying observations was that companies have a large amount of consumer-grade IoT devices on their networks.

At least 186 EU ISPs use deep-packet inspection to shape traffic, break net neutrality

At least 186 EU ISPs use deep-packet inspection to shape traffic, break net neutrality

The EDRi is worried about the increased usage of deep-packet inspection technology as a whole, because this technology allows ISPs to shape traffic and enforce tiered pricing plans, but it also poses a threat to user privacy, as it allows telcos a deeper look at the sites users are accessing.

Why 5G is a huge future threat to privacy

Why 5G is a huge future threat to privacy

The same news item includes details about the concerns of Christopher Krebs, director of the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency: First, Krebs said, “the quality of the engineering is not great, and so there are a number of vulnerabilities that are left open on the box, so China and other capable actors – Russia, Iran, North Korea – could exploit the vulnerabilities”.

The best privacy-focused browsers in 2019

The best privacy-focused browsers in 2019

img: Data-Protection-Word-Cloud.jpegBoth of these social media giants are relying on ads for profits: Google is using Chrome browser and Google search engine to provide you with better ads while Facebook is pushing them straight to your newsfeed.

Why Uber Is Fighting Cities Over Data About Scooter Trips

Why Uber Is Fighting Cities Over Data About Scooter Trips

To operate in Los Angeles, a city whose placid weather and flat-ish streets make an appealing market for scooter and bike companies, the firms had to agree to share data with LA’s Department of Transportation through MDS.

Putin Signs 'Sovereign Internet' Law, Expanding Government Control of Internet

Putin Signs 'Sovereign Internet' Law, Expanding Government Control of Internet

Russian President Vladimir Putin has signed into law a new measure that aims to expand government control over the Internet. Critics have warned that the new law, signed by Putin on May 1 and published on the Kremlin website, will lead to censorship over wide parts of the Internet.

Double Edged Sword of Secure Traffic

Double Edged Sword of Secure Traffic

If this is a device issued by the organization or if a certificate is required to gain internet access, then the user effectively agrees to this level of supervision.

Hackers Can Tell What Netflix Bandersnatch Choices You Make

Hackers Can Tell What Netflix Bandersnatch Choices You Make

In practice, though, the researchers say that they can analyze Netflix's encrypted interactive video traffic to find clues about what users are watching, and which choices they've made in their movie journeys.

Russia passes bill to allow internet to be cut off from foreign servers

Russia passes bill to allow internet to be cut off from foreign servers

Russia passes bill to allow internet to be cut off from foreign servers. Critics say implementing the measures would be expensive and give vast censorship powers to the government’s new traffic monitoring centre.

Launching the Mozilla Plugin Privacy Test Database

Launching the Mozilla Plugin Privacy Test Database

The results are interesting from a passive collection perspective - plugins that store user data when clicked are significantly safer than plugins that track all web activity all the time.

Your Location Is Gold to Businesses

Your Location Is Gold to Businesses

Google Maps — Multiple-Billion-Dollar Business Based on a Free Map. Location-targeted mobile advertisement spending is quickly growing. Based on its users’ 12 billion check-in data points every month, Foursquare accurately predicted the amount of new iPhone sales and has attracted 125,000 developers to work on its platform.

Can a VPN keep you safe from 36 new 4G LTE security vulnerabilities?

Can a VPN keep you safe from 36 new 4G LTE security vulnerabilities?

A team of four researchers from South Korea’s KAIST, the country’s premier tech institution, have discovered 36 new vulnerabilities in 4G LTE that have wide ranging security and privacy implications.

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis

55 unique entities, owned by 46 parent companies, received or processed app user data, including developers and parent companies (first parties) and service providers (third parties). 37 (67%) provided services related to the collection and analysis of user data, including analytics or advertising, suggesting heightened privacy risks.

Nevada considers technology to scan cellphones after crashes

Nevada considers technology to scan cellphones after crashes

(AP) — Most states ban texting behind the wheel, but a legislative proposal could make Nevada one of the first states to allow police to use a contentious technology to find out if a person was using a cellphone during a car crash.