"The new documents reveal that a GCHQ unit dubbed the Joint Threat Research Intelligence Group, or JTRIG, launched an operation called Rolling Thunder against the hacker collective in 2011. That operation included using DDoS attacks as well as malware to slow down the hackers and later identify them, as first reported by as reported by NBC News on Wednesday."
"* 1.8m users targeted by UK agency in six-month period alone
* Optic Nerve program collected Yahoo webcam images in bulk
* Yahoo: 'A whole new level of violation of our users' privacy'"
"Copyright and Creation, a policy brief from a collection of respected scholars at the rock-ribbed London School of Economics, argues that the evidence shows that piracy isn't causing any grave harm to the entertainment industry, and that anti-piracy measures like the three-strikes provision in Britain's Digital Economy Act don't work. They call on lawmakers to take an evidence-led approach to Internet and copyright law, and to consider the interests of the public and not just big entertainment companies looking for legal backstops to their profit-maximisation strategies. "
"Scientists from University of Washington have been struggling for the past decade to decipher the complex structure of an enzyme that exhibits behavior similar to that of an enzyme key in the development of AIDS from an HIV infection, and which might hold a critical role in building a cure for the disease. Gamers playing spatial game Foldit have managed to collectively determine the enzyme's structure in ten days."
"Taken as a whole, the information Google collects about users is shockingly complete. The company can mine your emails and Drive documents, track your browsing history, track the videos you watch on YouTube, obtain your WiFi passwords and much more."
"Fear of data-mining of healthcare could be costing as many as 100,000 lives a year, according to Google's Larry Page.
Speaking out in response to fears over his company's vast haul of personal information, Page made the case that not only is Google not going too far with collecting and analysing such information - it's not going far enough."
"A giant database of intercepted Snapchat photos and videos has been released by hackers who have been collecting the files for years. Shocked users of the notorious chat forum 4chan are referring to the hack as "The Snappening," noting that this is far bigger than the iCloud hacks that recently targeted celebrities."
"The NSA's plans don't end with collecting your phone records. Here are just a few of the ways the National Security Agency (NSA) will be keeping tabs on you in the world of tomorrow. Prepare to be shocked, amazed, and a little freaked out."
"While Keenan emphasised the capability was not a centralised biometric database, and was simply an improved way to share information already collected by different Australian jurisdictions, Gregory questioned how these images of Australians will be employed by law enforcement. "It's subtle changes in the way that things are used that need to be debated the most," he said. "In this case, we're talking about using our passport photos for a purpose for which we never gave permission.""
Clear rules are needed to govern what social networks can do with the massive amount of personal data they collect and how they inform their users about their practices, said Sen. Charles Schumer, who has asked the FTC to articulate a set of guidelines. Facebook claims it offers users "powerful" privacy tools, but Paul Stephens of the Privacy Rights Clearinghouse suggested consumers need a PhD to understand them.
"Regin is a tool capable of infecting and compromising entire networks, not just individual computers, as security companies Symantec and Kaspersky Labs detailed in their technical reports published on Sunday and Monday.
It's not only a computer virus or malware, but also a toolkit or platform that can be used for different purposes, depending on the needs of the attackers. It can collect passwords, retrieve deleted files, and even take over entire networks and infrastructures, according to researchers. "
"Nemitz identifies four bases of digital power which create and then reinforce its unhealthy concentration in too few hands: lots of money, which means influence; control of "infrastructures of public discourse"; collection of personal data and profiling of people; and domination of investment in AI, most of it a "black box" not open to public scrutiny.
The key question is which of the challenges of AI "can be safely and with good conscience left to ethics" and which need law. Nemitz sees much that needs law."
"The Facebook data, which captured the engagement metrics on thousands of posts by the six major party leaders in the two months leading up to the election, was collected by academics at the University of Pisa's MediaLab.
It reveals all of the 25 most shared Facebook posts in the two months leading up to the election were videos, live broadcasts or photos from either Salvini, who runs the far-right League, or Di Maio, the leader of the anti-establishment Five Star Movement (M5S)."
"The judges considered three aspects of digital surveillance: bulk interception of communications, intelligence sharing and obtaining of communications data from communications service providers.
By a majority of five to two votes, the Strasbourg judges found that GCHQ's bulk interception regime violated article 8 of the European convention on human rights, which guarantees privacy, because there were said to be insufficient safeguards, and rules governing the selection of "related communications data" were deemed to be inadequate."
"A dump called "Collection #1" has been released by parties unknown, containing email addresses and cracked passwords: in its raw form, it contains 2.7 billion records, which Troy "Have I Been Pwned" Hunt (previously) de-duplicated to come up with 773 million unique records -- of those 140,000,000 email addresses and 10,000,000 passwords have never been seen in the HaveIBeenPwned database before."
""As we have made clear, we believe that data collected in public space must be overseen and closely controlled by an independent and publicly accountable Data Trust, not Sidewalk Labs, Google, or any private company," said spokesperson Keerthana Rang."
"The revelation that encrypted email is vulnerable to a variety of devastating attacks (collectively known as "Efail") has set off a round of soul-searching by internet security researchers and other technical people -- can we save email?
One way to think about Efail is that it was caused by a lack of central coordination and control over email-reading programs -- the underlying protocols are strong and robust, but they can be implemented in ways that create real problems. In particular, the ability to show HTML inside a message makes email very hard to secure:"
"From our vantage point, this arc from the stocking frames of the Luddites to the Factory Acts makes total sense: a transformative technological change, its adaptation unfettered by regulation, and then the demand for a collective response as the implications of those changes become clearer."
"A group of current and former contractors who worked for years at the social network's Berlin-based moderation centres has reported witnessing colleagues become "addicted" to graphic content and hoarding ever more extreme examples for a personal collection. They also said others were pushed towards the far right by the amount of hate speech and fake news they read every day."
"Twitter sent a letter this week to the small start-up company, Clearview AI, demanding that it stop taking photos and any other data from the social media website "for any reason" and delete any data that it previously collected, a Twitter spokeswoman said. "