136 private links
UC Berkeley professor Stuart Russell and the Future of Life Institute have created an eerie viral video titled "Slaughterbots" that depicts a future in which humans develop small, hand-sized drones that are programmed to identify and eliminate designated targets.
You may know that most websites have third-party analytics scripts that record which pages you visit and the searches you make. But lately, more and more sites use “session replay” scripts. These scripts record your keystrokes, mouse movements, and scrolling behavior, along with the entire contents of the pages you visit, and send them to third-party servers. Unlike typical analytics services that provide aggregate statistics, these scripts are intended for the recording and playback of individual browsing sessions, as if someone is looking over your shoulder.
The stated purpose of this data collection includes gathering insights into how users interact with websites and discovering broken or confusing pages. However the extent of data collected by these services far exceeds user expectations [1]; text typed into forms is collected before the user submits the form, and precise mouse movements are saved, all without any visual indication to the user. This data can’t reasonably be expected to be kept anonymous. In fact, some companies allow publishers to explicitly link recordings to a user’s real identity.
The UpGuard Cyber Risk Team can now disclose that three publicly downloadable cloud-based storage servers exposed a massive amount of data collected in apparent Department of Defense intelligence-gathering operations. The repositories appear to contain billions of public internet posts and news commentary scraped from the writings of many individuals from a broad array of countries, including the United States, by CENTCOM and PACOM, two Pentagon unified combatant commands charged with US military operations across the Middle East, Asia, and the South Pacific.
We are now subject to a greater level of surveillance than any point in history, and most of it is thanks to the digital revolution of the last few decades. Lucy Ingham hears from the legend Richard Stallman about how the digital transformation has dramatically eroded our privacy, and what it means for our lives
Unternehmen können Geofencing aber auch nutzen, um Mitarbeiter im Außendienst zu überwachen, Zeitkarten zu automatisieren oder das Firmeneigentum im Auge zu behalten.
Wie könnte ein Botnetz auch IoT-Kameras erreichen, die nicht direkt am Internet hängen, sondern hinter einer Firewall oder einem Router? Sicherheitslücken in Clouddiensten ließen solche Angriffe zu - sagen Hacker auf der Deepsec.
Die Diskussion über die Einführung sogenannter Bundestrojaner steht vor ihrem Comeback. In den Koalitionsverhandlungen zwischen ÖVP und FPÖ ist die Überwachung von Messenger, wie Whatsapp, ein Thema. Bisher waren die Freiheitlichen vehement gegen den Einsatz staatlicher Überwachungssoftware, aber beide Verhandlungsparteien versuchen nun diesbezüglich einen "Kompromiss" zu finden, wie FPÖ-Chef Heinz-Christian Strache bei einer Pressekonferenz nach der Verhandlungsrunde am Freitag sagte.
Before the advent of smartphones you weren't under constant surveillance with an always-on network. Now an unholy trinity of smartphone, network, and artificial intelligence threatens to let the well-intentioned regulate every aspect of life. If you're drunk, will your smartphone let you drive?
An apparent factory cockup has left OnePlus Android smartphones with an exposed diagnostics tool that can be potentially exploited to root the handsets.
An iPad in each dressing room lets shoppers call an attendant or enter in their selections, editing their choices on the fly. Salespeople are all equipped with mobile point-of-sale devices so that customers can check out in the dressing room and walk right out of the store.
the tech isn’t perfect. Your iPhone X might not always unlock; a cop might arrest the wrong person. In order for software to always recognize your face as you, an entire sequence of algorithms has to work. First, the software has to be able to determine whether an image has a face in it at all. If you’re a cop trying to find a missing kid in a photo of a crowd, you might want the software to sort the faces by age. And ultimately, you need an algorithm that can compare each face with another photo in a database, perhaps with different lighting and at a different angle, and determine whether they’re the same person.
The United States government has published its new policy for publicly disclosing vulnerabilities and security holes.
A group of 54 computer scientists and academic researchers on Thursday asked the US Department of Homeland Security to rethink its plan for employing software algorithms to determine whether immigrants to the country should be admitted or deported.
The Australian Broadcasting Corporation (ABC) has accidentally leaked sensitive data from at least two unsecured Amazon Web Services (AWS) S3 repositories, according to Kromtech Security Center.
Criminals are exploiting “fake news” for commercial gain, according to new research.
Fake news is widely assumed to be political or ideological propaganda published to sway public opinion, but new research conducted by threat intel firm Digital Shadows and released on Thursday suggested fake news generation services are now aimed at causing financial and reputational damage for companies through disinformation campaigns.
According to El Diario, the authorities responded to Infineon's October vulnerability disclosure by revoking, on November 6, all certificates issued since April 2015.
What's more, the authorities have stopped letting people sign things with the card at the self-service terminals found at many police stations.
That decision affects every card, not only those that have the flaw.
But there is as yet no indication of when the affected cards will be updated. Indeed, there doesn't seem to be much official information out there at all, something which has not gone unnoticed in the Spanish tech press.
"Neither the police nor other public bodies have given more information through their social media accounts about the impact of the vulnerability and how to act if affected," said Xataka.
Die Allianz-Versicherung spricht sich strikt gegen den Einsatz von Fitness-Armbändern für Bonusprogramme aus. „Eine Krankenversicherung darf den Tarif nicht vom persönlichen Verhalten abhängig machen. Das ist in Deutschland nicht erlaubt, und auch nicht richtig“, sagt Daniel Bahr, Vorstand der privaten Krankenversicherung Allianz, in der Frankfurter Allgemeinen Sonntagszeitung. „Wir werden so etwas nicht tun.“
London's Metropolitan Police force's use of "intrusive" technologies "without proper regulation" could put a fundamental principle of policing at risk, the London mayor has been told.
In a letter to Sadiq Khan, the Greater London Assembly – the group elected to hold the mayor to account – expressed "significant concerns" about facial recognition technology.
Eating popcorn in the cinema may be irritating not just for fellow movie goers, but for advertisers: a group of researchers from Cologne University has concluded that chewing makes us immune to film advertising.
In broad terms, the fight over section 702 of America's Foreign Intelligence Surveillance Act (FISA) comes down to a single issue: should the powers within it that allow the intelligence services to intercept and store communications on foreign intelligence targets be extended to cover US citizens?