136 private links
Security researchers from Rhino Security Labs have shown that it is trivial to disable the Amazon Cloud Cam that is a crucial component of the Amazon Keyproduct -- a connected home door-lock that allows delivery personnel to open your locked front door and leave your purchases inside -- and have demonstrated attacks that would allow thieves to exploit this weakness to rob your home
In a paper published on the ArXiv, researchers from the University of California, San Diego, and Adobe have outlined a way for AI to not only learn a person’s style but create computer-generated images of items that match that style. The system could let retailers create personalized pieces of clothing, or could even be used to help predict broader fashion trends.
potentially the most problematic aspects of Brexit are not the big issues but the small technical details: too small to merit day-to-day attention but too important to be left to float on the tides of the Brexit seas.
One such issue is potentially data transfers between the UK and the EU after Brexit. Although not as immediate or striking as the Irish border issue, nor as politically engaging as the issue of devolution and Brexit this has the potential to derail UK trade post Brexit across every sector of the economy from finance to manufacturing by way of education, agriculture, and media and entertainment. The reason for such a potentially catastrophic outcome is because as first observed by Clive Humby, the architect of Tesco’s Clubcard scheme, in 2006 and oft repeated since, “data is the new oil”.
Um europäische Verbraucher besser grenzüberschreitend zu schützen, hat die EU gestern ein umfangreiches Maßnahmenpaket verabschiedet. Doch auf den letzten Metern wurden Netzsperren in die EU-Verordnung hineinverhandelt, die weder effektiv noch verhältnismäßig sind.
The governments of 30 countries around the globe are using armies of so called opinion shapers to meddle in elections, advance anti-democratic agendas and repress their citizens, a new report shows.
A rare court case exposes the horror of online harassment that followed when one woman broke off a relationship.
Amazon's audio surveillance personal assistant device, Alexa, has acquired an external battery pack called Dox.
The appropriately named portable energy store, made by lifestyle gadgetry firm Ninety7, does not (thankfully) do what its name says.
A consumer group is urging major retailers to withdraw a number of “connected” or “intelligent” toys likely to be popular at Christmas, after finding security failures that it warns could put children’s safety at risk.
It is safe to say that it is in YouTube’s best interest to keep you on its website as long as possible. Presumably as you stay to watch videos, more ads can be played, and more money can be made, which is why YouTube tends of make suggestions on videos that you might be interested in.
Why should companies be the major, and often the only, beneficiaries of this largess? They shouldn’t. Those financial benefits need to be shared, and the best way to do it is to impose a small tax on this revenue and use the proceeds to build a better, more equitable internet and society that benefit us all.
Die App "Oyoty" soll Eltern dabei helfen, ihre Kinder vor Sexting und bösen Fallen im Social Web zu schützen.
The world's largest biometric identity card system is in India. And if the government gets its way, ID cards will soon be linked to mobile phones and bank accounts of more than a billion Indians.
Missouri Attorney General Josh Hawley's office is investigating Google.
The investigation focuses on Google's use of data and whether the search giant is stifling competition.
Some Uber drivers in Lagos have been using a fake GPS itinerary app to illicitly bump up fares for local riders.
Initially created for developers to “test geofencing-based apps,” Lockito, an Android app that lets your phone follow a fake GPS itinerary, is being used by Uber drivers in Lagos to inflate the cost of their trips.
The Vietnamese security company Bkav says that a prototype mask costing $150 can reliably defeat Apple's Face ID authentication system. However, the company (which has a good track record for defeating facial recognition systems) has not released technical details for the defeat
Privacytools.io showcases web platforms, utilities and services that center on maintaining online user privacy. Anonymous browsing, decentralized social media, note-taking applications, even router firmware. There's a downloadable tool to help secure Windows 10, the "privacy nightmare" of operating systems.
Wir zahlen für Big Brother:
The first generation of HomePods, Apple’s intelligent speaker, isn’t shipping until December, but according to a report by Nikkei, Apple supplier Inventec Appliances is already making projections that future models might have facial and image recognition.
For months, the WikiLeaks Twitter account has carried on a secret correspondence with Donald Trump Jr., according to messages published today by The Atlantic. The messages, which have also been provided to congressional investigators, show WikiLeaks pushing President Trump’s son to share a variety of messages, ranging from anti-Clinton news to data stolen directly from the campaign. In one case, WikiLeaks even shared the password to an anti-Trump PAC’s website, a potential violation of computer hacking laws.
During a keynote on Nov. 8 at the 2017 CyberSat Summit, a DHS official admitted that he and his team of experts remotely hacked into a Boeing 757.
This hack was not conducted in a laboratory, but on a 757 parked at the airport in Atlantic City, New Jersey. And the actual hack occurred over a year ago; we are only now hearing about it thanks to a keynote delivered by Robert Hickey, aviation program manager within the Cyber Security Division of the DHS Science and Technology (S&T) Directorate.
A London man found a USB stick on a pavement in west London and (unwisely) plugged it into a computer, only to discover that it contained 76 folders with at least 174 documents full of sensitive information on the security arrangements at Heathrow airport, including "the types of ID needed to access restricted areas, a timetable of security patrols and maps pinpointing CCTV cameras" as well as the measures used to protect the Queen when she flies through LHR.