In 2017, a flaw causing vulnerabilities in millions of encryption keys, including national Estonian electronic ID (eID) cards, was discovered. A month and a half after the discovery, the Estonian Police publicly announced the vulnerability, but stated that the eID cards “are completely secure”.
Our article on the problems with the Estonian eID card attracted some criticism and non-specific allegations of inaccuracies. We recognise the sensitivities of the Estonian authorities on this issue, but stand behind the article.
Österreichische Mitglieder der genannten Fraktionen stimmten loyal zur Fraktionslinie – also ÖVP, FPÖ und Neos für Netzsperren, Grüne dagegen. Die sozialdemokratischen Abgeordneten aus Österreich enthielten sich. Vor der Nationalratswahl hatten sich alle Parteien außer der ÖVP gegen Netzsperren ausgesprochen.
@sonstwer: Warum macht ihr das @neos_eu ?
@neos_eu: schwurbel
@stefankasberger: Kurz zusammen gefasst also: Konsument vor Bürger, right?
Fehlinformationen, Sexfallen, gezielte Rufschädigung: Die Methoden, mit denen der britische Geheimdienst die Kommunikation im Internet manipulieren will, sind nicht zimperlich. Auch Unverdächtige sind im Visier der Agenten.
Researchers working on browser fingerprinting found themselves distracted by a much more serious privacy breach: analytical scripts siphoning off masses of user interactions.
Wer eine Pornoseite öffnen will, bekommt stattdessen religiöse Gesänge oder motivierende Ansprachen von Politikern angezeigt. So soll das Verhalten der Nutzer geändert werden.
Russland beantwortet US-Sanktionen mit Auflagen gegen Voice of America und Radio Liberty. Die wegen angeblicher Spionage ebenfalls von Sanktionen bedrohte russische Anti-Viren-Firma Kaspersky dreht den Spieß um und blamiert die NSA.
UC Berkeley professor Stuart Russell and the Future of Life Institute have created an eerie viral video titled "Slaughterbots" that depicts a future in which humans develop small, hand-sized drones that are programmed to identify and eliminate designated targets.
You may know that most websites have third-party analytics scripts that record which pages you visit and the searches you make. But lately, more and more sites use “session replay” scripts. These scripts record your keystrokes, mouse movements, and scrolling behavior, along with the entire contents of the pages you visit, and send them to third-party servers. Unlike typical analytics services that provide aggregate statistics, these scripts are intended for the recording and playback of individual browsing sessions, as if someone is looking over your shoulder.
The stated purpose of this data collection includes gathering insights into how users interact with websites and discovering broken or confusing pages. However the extent of data collected by these services far exceeds user expectations [1]; text typed into forms is collected before the user submits the form, and precise mouse movements are saved, all without any visual indication to the user. This data can’t reasonably be expected to be kept anonymous. In fact, some companies allow publishers to explicitly link recordings to a user’s real identity.
The UpGuard Cyber Risk Team can now disclose that three publicly downloadable cloud-based storage servers exposed a massive amount of data collected in apparent Department of Defense intelligence-gathering operations. The repositories appear to contain billions of public internet posts and news commentary scraped from the writings of many individuals from a broad array of countries, including the United States, by CENTCOM and PACOM, two Pentagon unified combatant commands charged with US military operations across the Middle East, Asia, and the South Pacific.
We are now subject to a greater level of surveillance than any point in history, and most of it is thanks to the digital revolution of the last few decades. Lucy Ingham hears from the legend Richard Stallman about how the digital transformation has dramatically eroded our privacy, and what it means for our lives
Unternehmen können Geofencing aber auch nutzen, um Mitarbeiter im Außendienst zu überwachen, Zeitkarten zu automatisieren oder das Firmeneigentum im Auge zu behalten.
Wie könnte ein Botnetz auch IoT-Kameras erreichen, die nicht direkt am Internet hängen, sondern hinter einer Firewall oder einem Router? Sicherheitslücken in Clouddiensten ließen solche Angriffe zu - sagen Hacker auf der Deepsec.
Die Diskussion über die Einführung sogenannter Bundestrojaner steht vor ihrem Comeback. In den Koalitionsverhandlungen zwischen ÖVP und FPÖ ist die Überwachung von Messenger, wie Whatsapp, ein Thema. Bisher waren die Freiheitlichen vehement gegen den Einsatz staatlicher Überwachungssoftware, aber beide Verhandlungsparteien versuchen nun diesbezüglich einen "Kompromiss" zu finden, wie FPÖ-Chef Heinz-Christian Strache bei einer Pressekonferenz nach der Verhandlungsrunde am Freitag sagte.
Before the advent of smartphones you weren't under constant surveillance with an always-on network. Now an unholy trinity of smartphone, network, and artificial intelligence threatens to let the well-intentioned regulate every aspect of life. If you're drunk, will your smartphone let you drive?
An apparent factory cockup has left OnePlus Android smartphones with an exposed diagnostics tool that can be potentially exploited to root the handsets.
An iPad in each dressing room lets shoppers call an attendant or enter in their selections, editing their choices on the fly. Salespeople are all equipped with mobile point-of-sale devices so that customers can check out in the dressing room and walk right out of the store.
the tech isn’t perfect. Your iPhone X might not always unlock; a cop might arrest the wrong person. In order for software to always recognize your face as you, an entire sequence of algorithms has to work. First, the software has to be able to determine whether an image has a face in it at all. If you’re a cop trying to find a missing kid in a photo of a crowd, you might want the software to sort the faces by age. And ultimately, you need an algorithm that can compare each face with another photo in a database, perhaps with different lighting and at a different angle, and determine whether they’re the same person.
The United States government has published its new policy for publicly disclosing vulnerabilities and security holes.
A group of 54 computer scientists and academic researchers on Thursday asked the US Department of Homeland Security to rethink its plan for employing software algorithms to determine whether immigrants to the country should be admitted or deported.