"SINGAPORE - In the not too distant future, surveillance cameras sitting atop over 100,000 lampposts in Singapore could help authorities pick out and recognise faces in crowds across the island-state.
The plan to install the cameras, which will be linked to facial recognition software, is raising privacy fears among security experts and rights groups. The government said the system would allow it to "perform crowd analytics" and support anti-terror operations."
"But Computercop isn't security software -- quite the opposite; it's classic malware. The software, made in New York by a company that markets to law enforcement, is a badly designed keylogger that stores thingstyped into the keyboard -- potentially everything typed on the family PC -- passwords, sensitive communications, banking logins, and more, all stored on the hard drive, either in the clear, or with weak, easily broken encryption. And Computercop users are encouraged to configure the software to email dumps from the keylogger to their accounts (to spy on their children's activity), so that all those keystrokes are vulnerable to interception by anyone between your computer and your email server. "
"One of the most widely used tools for monitoring and restricting pupils' internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children's personal information exposed to hackers, a researcher has warned."
"Up to 10 million Android smartphones have been infected by malware that generates fake clicks for adverts, say security researchers.
The software is also surreptitiously installing apps and spying on the browsing habits of victims.
The malware is currently making about $300,000 (£232,000) a month for its creators, suggests research."
"Chinese police say they used facial recognition to identify, then arrest a man attending a crowded concert in Nanchang, China's third largest city. South China Morning Post reports that security cameras equipped with the software pinpointed the man out of the estimated 50,000 other people also in attendance at the concert. "
"Three software flaws in Facebook's systems allowed hackers to break into user accounts, including those of the top executives Mark Zuckerberg and Sheryl Sandberg, according to two people familiar with the investigation but not allowed to discuss it publicly. Once in, the attackers could have gained access to apps like Spotify, Instagram and hundreds of others that give users a way to log into their systems through Facebook."
"Teslas are incredibly data-hungry, storing massive troves of data about their owners, including videos of crashes, location history, contacts and calendar entries from paired phones, photos of the driver and passengers taken with interior cameras, and other data; this data is stored without encryption, and it is not always clear when Teslas are gathering data, and the only way to comprehensively switch off data-gathering also de-activates over-the-air software updates for the cars, "
"This led to claims that the software is woefully inaccurate; in fact, police had set the threshold for a match at 60%, meaning that faces do not have to be rated as that similar to be flagged up. This minimises the chance of a person of interest slipping through the net, but also makes a lot of false positives inevitable."
"In these cases, we call the SDKs "trackers" or "tracker SDKs." We follow the lead of the Electronic Frontier Foundation, Fight for the Future, and other digital rights organizations and use the term broadly: "Trackers" encompasses traditional advertisement surveillance, behavioral, and location monitoring. Legitimate uses may include user feedback mechanisms, telemetry, and crash reporters.
App developers have decided to include tracker SDKs in apps for a variety of reasons, and we do not categorize all usage of trackers as malicious or condemn the app authors. Additionally, given the complexity and pace of software development, some developers may not be aware that trackers are in their app or may not know the full implications of bundling such code before publishing."
"From a practical standpoint, that means government agencies, like the Portland Bureau of Police, cannot use facial recognition software for videos from body cameras, dash cams, or any other form of surveillance equipment."