Skip to main content

Home/ Digit_al Society/ Group items tagged security politics and government

Rss Feed Group items tagged

dr tech

Google, Mozilla, and Apple are using this one weird trick to block Kazakhstan's surveil... - 0 views

  •  
    "Google and Mozilla are making changes to their respective web browsers to try and thwart the notoriously corrupt government of Kazakhstan's efforts to launch a surveillance operation against its own citizens."
dr tech

British Parliament hit by cyber security attack - media reports - The Economic Times - 0 views

  •  
    ""Closer investigation by our team confirmed that hackers were carrying out a sustained and determined attack on all parliamentary user accounts in an attempt to identify weak passwords. These attempts specifically were trying to gain access to our emails. "
dr tech

A critical flaw in Switzerland's e-voting system is a microcosm of everything wrong wit... - 0 views

  •  
    ""We have only examined a tiny fraction of this code base and found a critical, election-stealing issue," said Lewis, who is currently executive director of the Open Privacy Research Society, a Canadian nonprofit that develops secure and privacy-enhancing software for marginalized communities. "Even if this [backdoor] is closed its mere existence raises serious questions about the integrity of the rest of the code.""
dr tech

Bahraini activist sentenced to 6 months in jail for one tweet - 0 views

  •  
    "Prominent Bahraini activist Nabeel Rajab was sentenced to six months in jail on Tuesday after criticizing the country's security forces on Twitter. Rajab was arrested in October for tweeting that Bahrain's security organizations are "ideological incubators" for those who join terrorist groups."
dr tech

China's social credit score is like a 'Black Mirror' episode - Business Insider - 0 views

  •  
    "The Chinese government is planning on implementing a system that connects citizens' financial, social, political, and legal credit ratings into one big social trustability score. The idea would be that if someone breaks trust in one area, they'd be adversely affected everywhere."
dr tech

NSA leak reveal plans to subvert mobile network security around the world - Boing Boing - 0 views

  •  
    "The NSA's AURORAGOLD program -- revealed in newly released Snowden docs -- used plundered internal emails to compromise nearly every mobile carrier in the world, and show that the agency had planned to introduce vulnerabilities into future improvements into mobile security. "
dr tech

TikTok unveils European data security plan amid calls for US ban | TikTok | The Guardian - 0 views

    • dr tech
       
      To what extent will a policy ensure the security of data for social media, in a globalised economy?
  • “The Chinese government have never asked us for data,
  • TikTok’s data controls and transfer of data outside of the continent will be monitored by a third-party European cybersecurity firm,
  • ...1 more annotation...
  • Oracle will also monitor TikTok’s algorithms and source code
dr tech

We Mapped How the Coronavirus Is Driving New Surveillance Programs Around the World - 0 views

  •  
    "an attempt to stem the tide of the coronavirus pandemic, at least 30 governments around the world have instituted temporary or indefinite efforts to single out infected individuals or maintain quarantines. Many of these efforts, in turn, undermine personal privacy."
dr tech

Over 400,000 crime records could be affected by police computer error | Priti Patel | T... - 0 views

  •  
    "More than 400,000 crime records could have been affected by a data blunder, with records for serious offences supposed to be kept forever accidentally deleted and police fearing criminals may not be caught, a letter from a senior officer reveals. The records were accidentally deleted due to a coding error on 10 January, and the incident affects fingerprints, DNA, and arrest records on the police national computer (PNC)."
dr tech

Experts warn of new spyware threat targeting journalists and political figures | Hackin... - 0 views

  •  
    "Researchers at the Citizen Lab at the University of Toronto's Munk School said the spyware, which is made by an Israeli company called QuaDream, infected some victims' phones by sending an iCloud calendar invitation to mobile users from operators of the spyware, who are likely to be government clients. Victims were not notified of the calendar invitations because they were sent for events logged in the past, making them invisible to the targets of the hacking. Such attacks are known as "zero-click" because users of the mobile phone do not have to click on any malicious link or take any action in order to be infected."
dr tech

Security alert: notes from the frontline of the war in cyberspace | Technology | The Gu... - 0 views

  •  
    The battle for control of cyberspace is turning nasty, with young hackers, pirates and activists facing long prison sentences. We report from the frontline
dr tech

China launches quantum satellite for 'hack-proof' communications | World news | The Gua... - 0 views

  •  
    ""The satellite's two-year mission will be to develop 'hack-proof' quantum communications, allowing users to send messages securely and at speeds faster than light," Xinhua reported."
dr tech

The US fears back-door routes into the net because it's building them too | Technology ... - 0 views

  •  
    "In a discussion of how to secure the "critical infrastructure" of the United States he described the phenomenon of compromised computer hardware - namely, chips that have hidden "back doors" inserted into them at the design or manufacturing stage - as "the problem from hell". And, he went on, "frankly, it's not a problem that can be solved"."
dr tech

Tomorrow's Surveillance: Four Technologies The NSA Will Use to Spy on You - Soon - 0 views

  •  
    "The NSA's plans don't end with collecting your phone records. Here are just a few of the ways the National Security Agency (NSA) will be keeping tabs on you in the world of tomorrow. Prepare to be shocked, amazed, and a little freaked out."
dr tech

Blacklisted: The Secret Government Rulebook For Labeling You a TerroristThe Intercept - 0 views

  •  
    "The "March 2013 Watchlisting Guidance," a 166-page document issued last year by the National Counterterrorism Center, spells out the government's secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings."
dr tech

Cracking apps: are crimefighters going too far to bring down cartels? | Organised crime... - 0 views

  •  
    "The Italian supreme court ordered prosecutors last month to disclose how the Sky ECC data had been retrieved, arguing that it was impossible to have a fair trial if the accused is unable to access the evidence or assess its reliability and legality, a position supposed by the NGO Fair Trials. Whether prosecutors choose to do so could determine whether the arrests made this week lead to convictions or not. Prosecutors in the UK face a similar dilemma in relation to the hacking of EncroChat, another secret messaging platform that had the added facility of a "panic" button that when pressed would immediately erase the phone's contents."
dr tech

Snooper's charter: wider police powers to hack phones and access web history | World ne... - 0 views

  •  
    "The bill will now allow police to access all web browsing records in specific crime investigations, beyond the illegal websites and communications services specified in the original draft bill. It will extend the use of state remote computer hacking from the security services to the police in cases involving a "threat to life" or missing persons. This can include cases involving "damage to somebody's mental health", but will be restricted to use by the National Crime Agency and a small number of major police forces."
dr tech

Facebook says Iran-based hackers used site to target US military personnel | Facebook |... - 0 views

  •  
    "Facebook said on Thursday it had taken down about 200 accounts run by a group of hackers in Iran as part of a cyber-spying operation that targeted mostly US military personnel and people working at defense and aerospace companies. The social media company said the group, dubbed "Tortoiseshell" by security experts, used fake online personas to connect with targets, build trust - sometimes over the course of several months - and drive them to other sites, where they were tricked into clicking malicious links that would infect their devices with spying malware."
dr tech

UK cops are secretly harvesting all data from the phones and cloud accounts of suspects... - 0 views

  •  
    "Many services retain the data they harvest indefinitely, and some have been caught storing (and losing) the data without encryption: for example, in 2017 the Greater Manchester Police were found to have lost data from victims of violent and sexual crimes, which had been stored unencrypted on DVDs and sent through the post."
dr tech

Twitter hack shows why social media needs cybersecurity regulations - 0 views

  •  
    "According to the report, Twitter's security "problems" were only exacerbated by the push to remote work necessitated by the coronavirus pandemic. Like many other newly remote workers, Twitter's employees experienced tech problems working from home. Hackers were able to capitalize on this, tricking at least one Twitter employee into believing the hacker was a member of Twitter's IT team."
‹ Previous 21 - 40 of 78 Next › Last »
Showing 20 items per page