Welche persönlichen Daten Ihr Smartphone automatisch in die Google Cloud sichert, können Sie selbst mit einem rund 2000 Euro teurem Tool testen – denn den Cloud Explorer gibt es auch in einer leicht funktionseingeschränkten Demoversion. Er lädt alle Ihre persönlichen Daten aus der Google Cloud auf Ihren PC und analysiert diese für Sie. Eigentlich ist das Tool zur forensischen Analyse der Cloud-Daten gedacht. Entsprechend klein ist der Kreis der Kaufinteressenten für die Software und entsprechend hoch ist der Preis für die Vollversion von Cloud Explorer.
New figures released Friday reveal that Customs and Border Protection (CBP) officers searched 30,200 devices -- an increase of about 60 percent year-over-year -- between October 2016 and September 2017.
That averages out to about 2,500 searches each month out of more than 397 million who crossed the border -- or less than 0.01 percent of all international travelers, according to the agency charged with enforcing immigration and customs rules at the nation's ports of entry
Enforcing age verification checks for online porn sites could be detrimental to smaller ISPs and significantly increase online fraud, the government has admitted.
The measures, which are due to come into force in May, will require UK residents to prove they are 18 or over in order to get access to porn sites.
The plans have proved particularly unpopular, with a consultation finding that 54 per cent of respondents did not support the introduction of a law to require age verification.
If we were able to read the tiny, microscopic signs of our immune systems, we could catch and treat diseases like ovarian or pancreatic cancer before they become deadly. An early screening tool like that could save millions of lives a year — and Microsoft is working to make it a reality.
The tech giant announced Thursday that it is partnering with Seattle biotech company Adaptive Biotechnologies on a years-long project to build a universal blood test that can screen for dozens or even hundreds of diseases at a time, all by decoding the information in your immune system.
As part of the deal, Microsoft is investing an undisclosed sum in Adaptive and is offering the company cloud computing and machine learning services.
The Lancashire police force is examining ways in which the Amazon Echo could be used as an information source for local criminal activity.
The police are thrashing out ways in which the Echo could send out crime bulletins, missing person reports and wanted suspect alerts.
The smart speaker may also have internal use within the force, too, by blasting out reports of recent offenses, internal briefings, incident alerts in real-time and daily crime logs.
According to the publication, however, the speaker may also act as a conduit for victims and witnesses to connect to law enforcement by reporting crimes from the haven of their own home.
The only problem with password managers is that once a person has access to your master list, you’re in big trouble. This is why password managers usually have an added layer of security to prevent users from accessing the master list unless they have a master password, or in the case of LastPass where they created an app requiring users to scan their fingerprint or enter a PIN (this acts as two-factor authentication).
However last week it seems that a developer revealed that he was able to bypass the security on the Android version of LastPass Authenticator, which thankfully the company has since managed to fix. According to LastPass, “When a researcher discovered a workaround for the extra the PIN/fingerprint prompt, our engineering team fixed the issue that allowed the workaround and the update is available now. Now when the fingerprint/PIN feature is enabled, users must provide their fingerprint or PIN code in order to view the one-time code.”
Yoti (Your Own Trusted Identity) is a smartphone app that solves the identity problem for many digital services. But while it provides more privacy than most systems, it's not going to replace lying...
Fake news is becoming a huge problem and many companies know it. Companies such as Facebook are working on ways to help users identify fake news, and recently during a hackathon held at Yale University, a group of college students managed to develop a browser plug-in that detects fake news that you encounter on the internet.
Researchers are developing an internet-based tool they hope will predict the effectiveness of antidepressants for individual patients, ending the current prescription lottery.
If you care about maintaining privacy over medical records and prescriptions, this was not a good year.
As tech giants grapple with how to detect and scrub misinformation and propaganda from their social media platforms, French President Emmanuel Macron has a more extreme approach: Block the whole damn website.
In a speech to journalists on Wednesday, Macron said he planned to introduce new legislation to strictly regulate fake news online during political campaigns. His proposal included a number of measures, most drastically “an emergency legal action” that could enable the government to either scrap “fake news” from a website or even block a website altogether, the Guardian and Politico reported.
The Public Key Infrastructure (PKI) is the software system that allows to sign, validate certificate, keep a list of revoked certificates, distribute CA public key. The goal of PKI is to enable secure communication among parties who have never met before.
The most common use case of the PKI are myriad of the websites secured with TLS/HTTPS and using SSL certificates to establish trust for particular domain name(s) and authenticate the server side. Once the certificate is signed by the CA (certificate authority), it remains valid for a specific duration. When it’s about to expire, usually you renew it or buy a new one. But sometimes you need to revoke a certificate beforehand, usually due to a private key compromise.
Certificate revocation is a process of invalidating an issued SSL certificate. Ideally, browsers and other clients should be able to detect that the certificate is revoked in timely manner, show the security warning, that certificate is no longer trusted, and prevent user from further consuming such a website.
Per Thorsheim, Microsoft's Dr. Cormac Herley, the UK's NCSC, the Chief Technologist at FTC, I and many others are working hard to kill password expiration. Password expiration is when an organization requires their staff to change their passwords every 60, 90 or XX number of days. Password expiration is also a great example of how security professionals fail by simply repeating old myths or focusing on just mitigating risk, forgetting about the cost or impact of those mitigating controls. Here's is why password expiration must die
Entwickler und Hersteller von Mikrowellen und Öfen können bald die Alexa Smart Home Skill API nutzen. Der Name lässt es vermuten: Es geht um allerlei verzahnte Geräte in eurem Smart Home. Nachdem bisher Kameras, Türschlösser, Lampen, Unterhaltungssysteme und Thermostate auf die Alexa Smart Home Skill API zugreifen, können dies Öfen und Mikrowellen bald auch.
Starten will Amazon damit in den USA. Mit der integrierten Kochgerätesteuerung in der Smart Home Skill API sollen es Hersteller Kunden leichter machen, ihre mit der Cloud verbundene Mikrowelle zu steuern. Anstatt mehrere Tasten zu drücken, um erweiterte Mikrowellenfunktionen zu aktivieren, können so Kunden jetzt ihre Stimme verwenden. Ein Nutzer kann beispielsweise sagen: „Alexa, zwei Kilo Hack auftauen“ oder „Alexa, Mikrowelle für 50 Sekunden auf Hochtouren“.
Zehntausende sensible Schuldnerdaten sind in die Hände Dritter gelangt.
Grund ist ein Datenleck bei der Schweizer Tochter der Eos-Gruppe, einem der größtem Inkassounternehmen in Europa.
Die Dokumente enthalten hochsensible Informationen, etwa Krankenakten oder seitenlange Kreditkartenabrechnungen. Betroffen sind vorrangig Kunden in der Schweiz.
Auch Browser selbst verfügen über eingebaute Passwort-Manager, die nach einer Studie des Princeton University Center for Information Technology Policy jedoch eine Sicherheitslücke beherbergen, die es Werbe-Firmen möglich macht, euch im Netz zu tracken. Eine wichtige Information vorweg: Es werden keine Login-Daten gestohlen. Man macht sich lediglich die Information zunutze, was auch schlimm genug ist.
adblocking has set off a software-based arms race, with publishers finding software solutions that keep ads appearing or entreat people using adblocking software to white-list them. Adblockers readily respond with modified software that targets these specific responses, triggering the publishers to try again.
Some academics have recently stepped into the middle of this arms race, performing an analysis that allows them to identify the specific methods used by publishers to avoid having ads blocked. And the team has gone on to try a couple of different approaches, both of which modify a webpage's contents to keep the anti-adblocking software from having an effect.
The movement to encrypt the web reached milestone after milestone in 2017. The web is in the middle of a massive change from non-secure HTTP to the more secure, encrypted HTTPS protocol.
Barriss is alleged to have called in a lengthy threat to Wichita police on Thursday night after a Call of Dutygame in which two teammates got into an altercation over a $1.50 wager. Screenshots posted to various Twitter accounts show the dispute escalating. Shortly thereafter, the Wichita police received a call alleging that someone at that address had killed his father, taken his family hostage, poured gasoline around the home, and was ready to light it on fire. Cops descended on the area and cordoned it off. When 28-year-old Andrew Fitch opened the front door of his home to see why all the lights were flashing outside, he was shot and killed.
Ancestry.com said it closed portions of its community-driven genealogy site RootsWeb as it investigated a leaky server that exposed 300,000 passwords, email addresses and usernames to the public internet.