136 private links
A Michigan man who hacked into his local prison's computing system to gain early release for a friend is facing his own time inside after getting caught.

In a stern warning to the New Orleans City Council, the city’s top police watchdog has criticized a plan to expand surveillance without also expanding oversight. The Office of Independent Police Monitor (OIPM) warned that the city is on a path that may lead to abuse, racial discrimination, and fiscal waste.
Internet groups such as Facebook (FB.O), Google’s YouTube (GOOGL.O) and Twitter (TWTR.N) need to do more to stem the proliferation of extremist content on their platforms, the European Commission said after a meeting on Wednesday.
70'000 Zugangsdaten zu Web-Diensten wurden in der Schweiz gestohlen. Die Bundesstelle sagt nicht, um welche Dienste es sich handelt. Warum eigentlich?
Three years ago, we said the Echo was “the most innovative device Amazon’s made in years.” That’s still true. But you shouldn’t buy one. You shouldn’t buy one for your family. You definitely should not buy one for your friends. In fact, ignore any praise we’ve ever heaped onto smart speakers and voice-controlled assistants. They’re bad!
This report describes a campaign of targeted malware attacks apparently carried out by Ethiopia from 2016 until the present. In the attacks we document, targets receive via email a link to a malicious website impersonating an online video portal. When a target clicks on the link, they are invited to download and install an Adobe Flash update (containing spyware) before viewing the video. In some cases, targets are instead prompted to install a fictitious app called “Adobe PdfWriter” in order to view a PDF file. Our analysis traces the spyware to a heretofore unobserved player in the commercial spyware space: Israel’s Cyberbit, a wholly-owned subsidiary of Elbit Systems. The spyware appears to be a product called PC Surveillance System (PSS), recently renamed PC 360.
Intel and Foxconn have demonstrated use cases for 5G-based edge computing facial-recognition technology across payments, smart retailing, and access to residential and business buildings.
Bug-Bounty-Programm soll bei der Fehlersuche helfen – Wird auf Rechnern im Europäischen Parlament eingesetzt
.
Nach dem Grundsatz der „einmaligen Erfassung“ müssen Bürger wichtige Daten nur einmal vorlegen, heißt es in Brüssel. Diese Informationen sollen anschließend auf Antrag des Nutzers zugänglich gemacht werden, so dass sie für die meisten wichtigen grenzüberschreitenden Verfahren wiederverwendet werden können. Der EU-Datenschutzbeauftragte Giovanni Buttarelli hatte im Sommer bei diesem vorgesehenen „Once-only“-Prinzip noch Fragen im Hinblick die Privatsphäre der Beteiligten gesehen. Er vermisste etwa eine klare Rechtsbasis und zweifelte die Vereinbarkeit mit den Prinzipien der Zweckbestimmung und der Datensparsamkeit an
Das Videoportal Youtube hat die Verbreitung eines Videos eingeschränkt, das Gewalthandlungen gegen das Künstlerkollektiv Zentrum für politische Schönheit (ZPS) zeigt. Das Video ist in Deutschland, weiten Teilen von Europa und in französischen Überseeterritorien nicht mehr verfügbar. Für Nutzer aus anderen Ländern wird ein Warnhinweis gezeigt, gleichzeitig sind Kommentare, Teilen und das „Mag ich“-Symbol deaktiviert.
Die National Credit Federation bietet Hilfe für Menschen mit niedriger Kreditwürdigkeit an. Durch einen Fehler waren deren Daten allerdings für alle zugänglich in der Cloud ablegt.
China “does not have the stringent privacy laws that Western companies have, nor are Chinese citizens against having their data collected, as (arguably speaking) government monitoring is a fact of China,” analysts with the research firm Sanford C. Bernstein wrote in a report in November.
The Belfer Center at the Harvard Kennedy School of Government has published a nonpartisan Cybersecurity Campaign Playbook, as part of its Defending Digital Democracy project (previously, "designed to give you simple, actionable information that will make your campaign’s information more secure from adversaries trying to attack your organization—and our democracy."
The company says evidence of "unauthorized access" has appeared during a recent investigation.
Politicians regularly share their log-in details with staff and interns, according to Twitter postings by one MP
In this system, the lines of a user's palm become the key to revealing a password. Samsung depicts the hint as incomplete letters that are seemingly randomly positioned on the screen.
However, the position of each partial letter is customized to the enrolled user's palm. When users hold their palm up to the rear camera and the device recognizes it, the lines of the palm displayed on the screen help reveal the characters in a password. That's still just a hint given that it doesn't necessarily reveal their order.
Under-fire Cabinet Office minister Damian Green has reportedly told an internal government enquiry that he has proof he was not the one who downloaded porn onto his Parliamentary computer
Facebook Messenger, a photo and text messaging service, will soon be joined by Messenger Kids, a stand-alone app that allows children aged 13 and under to use the service.
While Touch ID is meant to secure a phone against unwanted users gaining access to your phone, the way Touch ID was designed allowed users to create multiple fingerprint IDs. The idea presumably is to allow users to use different fingers to unlock their phones, but it also meant that you could create fingerprint profiles for different users.