AvatarNick van TerheydenAvatarAvatarThe privacy loophole in your doorbellverified_publisherPOLITICO - By Alfred NgPolice were investigating his neighbor. A judge gave officers access to all his security-camera footage, including inside his home. The week of last Thanksgiving, Michael Larkin, a business owner in Hamilton, Ohio, picked up his phone and answered a call. It was the local police, and they wanted …
AvatarNick van TerheydenAvatarAvatarSnowflake helped Tor users thwart Russian censorship. Now the VPN is branching out as Snowstorm.verified_publisherMashable - Matt Binder"Putin couldn't block it." As protest and unrest grew in Russia and Iran over the past year, authoritarian regimes sought to crack down on civilians' internet access. These attempts were not entirely successful, in part thanks to anti-censorship tools like the anonymous web browser Tor. For years, …
AvatarNick van TerheydenFlipboardIcon version of the Flipboard logoTaiwan security chief blames trip leak on Huawei surveillance tech at Thai airportamericanmilitarynews.com - Radio Free AsiaEquipment manufactured by Chinese tech giant Huawei — which is obliged to aid the authorities in matters of national security — has been linked to …
AvatarNick van TerheydenFlipboardIcon version of the Flipboard logoEmail Defenses Under Siege: Phishing Attacks Dramatically Improvedarkreading.com - Robert Lemos, Contributing WriterThis week's report that cyberattackers are laser-focused on crafting attacks specialized to bypass Microsoft's default security showcases an alarming …
AvatarNick van TerheydenAvatarAvatarJohn Deere tractors are getting the jailbreak treatment from hackersverified_publisherPopular Science - Andrew PaulThe right-to-repair fight isn't limited only to smartphones. When it comes to “jailbreaking” products, people may usually envision hacking smartphones and tablets to skirt tech companies’ limitations on unlicensed modifications. In reality, however, the logic (and subsequent workarounds) are …
AvatarNick van TerheydenAvatarAvatarThe new USB Rubber Ducky is more dangerous than eververified_publisherThe Verge - Corin FaifeThe beloved hacker tool can now pwn you with its own programming language The USB Rubber Ducky is back with a vengeance. The much-loved hacking tool has a new incarnation, released to coincide with the Def Con hacking conference this year, and creator Darren Kitchen was on hand to explain it to The …
AvatarNick van TerheydenAvatarAvatarMeta injecting code into websites to track its users, research saysverified_publisherThe Guardian - Alex HernOwner of Facebook and Instagram is using code to follow those who click links in its apps, according to an ex-Google engineer
AvatarNick van TerheydenAvatarAvatarHospital data is funneled to Facebook, Verily's business model, and virtual reality surgerySTAT - Mario Aguilar, Mohana RavindranathFacebook is getting sensitive health data from hospital websites A tracking tool installed on many hospital websites has been gathering patients’ …
AvatarNick van TerheydenAvatarAvatarMicrosoft: Credit card skimmers are switching techniques to hide their attacksverified_publisherZDNET - Liam TungAttackers are using image files with hidden malicious PHP script to manipulate e-commerce checkout pages and capture payment card …
AvatarNick van TerheydenAvatarAvatarThe challenge of making data science zero-trustverified_publisherVentureBeat - Matthew Carroll, ImmutaOn March 21, President Biden warned of cyberattacks from Russia and reiterated the need to improve the state of domestic cybersecurity. We live in a world where adversaries have many ways to infiltrate our systems. As a result, today’s security professionals need to act under the premise that no …
AvatarNick van TerheydenAvatarAvatarResearchers find Amazon uses Alexa voice data to target you with adsverified_publisherThe Verge - Jennifer Pattison TuohyAmazon and third parties use data from smart speakers to sell you stuff, says report A report released last week contends that Amazon uses voice data from its Echo devices to serve targeted ads on its own platforms and the web. The report, produced by researchers affiliated with the University of …
AvatarNick van TerheydenAvatarAvatarUkraine conflict heightens US military’s data privacy vulnerabilitiesDefense News - Jessica Dawson and Brandon PughAmid the artillery strikes and armored assaults, several quieter aspects of Russia’s invasion of Ukraine require closer attention, including targeted …