136 private links
Privacytools.io showcases web platforms, utilities and services that center on maintaining online user privacy. Anonymous browsing, decentralized social media, note-taking applications, even router firmware. There's a downloadable tool to help secure Windows 10, the "privacy nightmare" of operating systems.
Wir zahlen für Big Brother:
The first generation of HomePods, Apple’s intelligent speaker, isn’t shipping until December, but according to a report by Nikkei, Apple supplier Inventec Appliances is already making projections that future models might have facial and image recognition.
For months, the WikiLeaks Twitter account has carried on a secret correspondence with Donald Trump Jr., according to messages published today by The Atlantic. The messages, which have also been provided to congressional investigators, show WikiLeaks pushing President Trump’s son to share a variety of messages, ranging from anti-Clinton news to data stolen directly from the campaign. In one case, WikiLeaks even shared the password to an anti-Trump PAC’s website, a potential violation of computer hacking laws.
During a keynote on Nov. 8 at the 2017 CyberSat Summit, a DHS official admitted that he and his team of experts remotely hacked into a Boeing 757.
This hack was not conducted in a laboratory, but on a 757 parked at the airport in Atlantic City, New Jersey. And the actual hack occurred over a year ago; we are only now hearing about it thanks to a keynote delivered by Robert Hickey, aviation program manager within the Cyber Security Division of the DHS Science and Technology (S&T) Directorate.
A London man found a USB stick on a pavement in west London and (unwisely) plugged it into a computer, only to discover that it contained 76 folders with at least 174 documents full of sensitive information on the security arrangements at Heathrow airport, including "the types of ID needed to access restricted areas, a timetable of security patrols and maps pinpointing CCTV cameras" as well as the measures used to protect the Queen when she flies through LHR.
Silicon Valley has reinvented the pay toilet. But this time, you have to use an app to get in, yielding metadata (foeterdata?) to the powers that be. Yield the who, what, when and where of your bowel movements with Good2Go, the shittiest valley startup yet. Their turd-key solution is free now, but you'll have to spend a penny later.
What could possibly go wrong .... ?
Die @warentest testet 9 Passwort-Manager.
Keiner davon ist KeePass.
Fast alle sind Abo-Modelle mit Cloud-Sync-Geraffel.
4x empfehlenswert
5x Sicherkeitskonzept sehr gut/gut
0x Open Source
orrrrrrrrrrrrrrr....
The Netherlands is set to have a national referendum about new mass-surveillance legislation, after opponents of the 'dragnet law', or Sleepwet, secured enough signatures to demand a poll.
Under Dutch law, the government has to hold a non-binding referendum on an issue if the country's Voting Commission receives at least 300,000 valid signatures demanding it.
Vendor Security Alliance (VSA), a coalition of companies aiming to improve internet security, has announced it will be conducting outsourced audits for member companies that satisfy the third-party requirement of the General Data Protection Regulation (GDPR).
VSA launched at the end of September 2016 as the side project from Ken Baylor, Uber's head of compliance. It caught on more quickly than Baylor and his co-founders expected -- around 8,000 companies had downloaded its survey by February 2017.
VSA kicked things off initially with nine member companies -- Uber, Docker, Dropbox, Palantir, Twitter, Square, Atlassian, GoDaddy, and Airbnb.
Amazon Web Services on Tuesday rolled out a series of new security and encryption features to its S3 cloud storage service. The features are available now for no additional charge. They follow the rollout of Macie, a data security service that uses machine learning to protect S3 content.
Bots and other suspicious social media accounts were used in an apparent attempt to influence voters in a heavily funded Washington state Senate race that could tip the balance of political power in the Western United States, according to a report from a non-partisan group of experienced cybersecurity researchers.
A serial leak of the agency’s cyberweapons has damaged
morale, slowed intelligence operations and resulted in
hacking attacks on businesses and civilians worldwide.
“I would never say I worked at Facebook,” said one 30-year-old software engineer who left the company last year to pursue an alternative career. Instead, at dinner parties he would give purposefully vague responses and change the subject. “There’s this song and dance you learn to play because people are quick to judge.”
Like Wall Street before, the tech industry is a justifiable punchbag. “MBA jerks used to go and work for Wall Street, now wealthy white geeks go to Stanford and then waltz into a VC or tech firm.”
The Glass Room in central London looks like a high-end tech store, but is actually an exhibition designed to encourage visitors to question how easily they give data away online.
Regardless of how you feel about Key, the Cloud Cam is easy to grok. You can use it in conjunction with the Key service (which at the moment is only available in select cities) or you can just use it on its own as security camera.
A British teenager who tried to order a car bomb on the dark web and get it delivered to his address has been found guilty this week.
This is why it doesn’t come as a surprise to see the company unveil a pair of NFC-enabled gloves for the Winter Olympic and Paralympic games. As the name suggests, these are gloves with NFC built into them, so what happens is that when customers want to make payment, instead of digging through their coats and pants for their wallets, they can simply wave their gloves over the payment terminal and it will be registered.
As a reporter who has covered technology for more than two decades, I am familiar with the usual forms of internet harassment—gangs that bring down a website, haters who post your home address online, troll armies that hurl insults on a social network. But I’d never encountered this type of email onslaught before. I wasn’t sure what to do.
It didn't take Delpy long to guess why his laptop had been the target of a literal black bag job. It contained the subject of his presentation at the Moscow conference, an early version of a program he'd written called Mimikatz. That subtly powerful hacking tool was designed to siphon a Windows user's password out of the ephemeral murk of a computer's memory, so that it could be used to gain repeated access to that computer, or to any others that victim's account could access on the same network. The Russians, like hackers around the world, wanted Delpy's source code.