The US National Security Agency (NSA) knew of the Heartbleed flaw in the widely used OpenSSL security tool and exploited it for year - instead of blowing the whistle so that the patch could be flawed."
"Taken as a whole, the information Google collects about users is shockingly complete. The company can mine your emails and Drive documents, track your browsing history, track the videos you watch on YouTube, obtain your WiFi passwords and much more."
"But Computercop isn't security software -- quite the opposite; it's classic malware. The software, made in New York by a company that markets to law enforcement, is a badly designed keylogger that stores thingstyped into the keyboard -- potentially everything typed on the family PC -- passwords, sensitive communications, banking logins, and more, all stored on the hard drive, either in the clear, or with weak, easily broken encryption. And Computercop users are encouraged to configure the software to email dumps from the keylogger to their accounts (to spy on their children's activity), so that all those keystrokes are vulnerable to interception by anyone between your computer and your email server. "
"A promo video from Pinkroccade, a prominent IT contractor to Dutch local governments, makes the case for spying on wearables (if your heart-rate rises because you're about to be mugged, the police could be alerted, and get GPS from your phone, find nearby phones belonging to people with criminal records, check the view from your Google Glass, and respond -- case closed). "
""A simple way of understanding what happened here is that you have a collision between a right to be forgotten and a right to know. From Google's perspective that's a balance," said Schmidt. "Google believes, having looked at the decision which is binding, that the balance that was struck was wrong.""
"There were staggering gaps in procedural and operational security, and the architecture of the system leaves it open to cyberattacks from foreign powers, such as Russia. "
"99 percent of the names submitted to the list are accepted; the court called this "wildly loose." The database has grown from 227,932 names in 2009 to its current stratospheric heights. There is no official, public procedure for having your name removed from the list. The US government is seeking to end the trial by invoking state secrecy."
"The type of tracking, called canvas fingerprinting, works by instructing the visitor's web browser to draw a hidden image, and was first documented in a upcoming paper by researchers at Princeton University and KU Leuven University in Belgium. Because each computer draws the image slightly differently, the images can be used to assign each user's device a number that uniquely identifies it."
"Three months passed. Then, on Wednesday, anonymous government officials reportedly confirmed that a local company called Systems Engineering of Egypt (SEE or See Egypt) had won the bid to develop the system, which would allegedly allow the Egyptian government to sniff and analyze Internet and social media activity, as well as intercept Skype, WhatsApp and Viber conversations. "
"Schools in the UK have experimented with fingerprinting pupils then using that data for tasks including library books and lunch payments.
However, the European Commission has questioned the practice, including whether schools can make it compulsory and whether parents can challenge it in court."
"A giant database of intercepted Snapchat photos and videos has been released by hackers who have been collecting the files for years. Shocked users of the notorious chat forum 4chan are referring to the hack as "The Snappening," noting that this is far bigger than the iCloud hacks that recently targeted celebrities."
"Freedom of information website WhatDoTheyKnow.com, which automates FOI requests and publishes responses, says it has recorded 154 accidental data leaks made by councils, government departments, police, the NHS and other public bodies since 2009. This amounts to confidential data being wrongly released on average once every fortnight."
"One of the most widely used tools for monitoring and restricting pupils' internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children's personal information exposed to hackers, a researcher has warned."
"The survey found that more than half of Americans say they do not want to lose control over their information but also believe this loss of control has already happened. Turow argues that marketers misrepresent Americans' behaviors by categorizing their acceptance of company discounts in exchange for personal data as rational acceptance of "tradeoffs."
"The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app - like Authy or Google Authenticator - or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area"
"Facebook is considering incorporating most of its 1 billion-plus members' profile photos into its growing facial recognition database, expanding the scope of the social network's controversial technology.
The possible move, which Facebook revealed in an update to its data use policy on Thursday, is intended to improve the performance of its "tag suggest" feature. The feature uses facial recognition technology to speed up the process of labelling or "tagging" friends and acquaintances who appear in photos posted on the network"
"In case you're wondering what could be wrong with entrusting secret keys to the government for use "in exceptional circumstances", just ponder this: a few months ago, hackers (suspected to be Chinese) stole the personnel records of 21.5 million US federal employees, including the records of every person given a government background check for the last 15 years."