Skip to main content

Home/ Digit_al Society/ Group items tagged vulnerabilities privacy and anonymity

Rss Feed Group items tagged

dr tech

Contact tracing apps unsafe if Bluetooth vulnerabilities not fixed | ZDNet - 0 views

  •  
    "As more governments turn to contact tracing apps to aid in their efforts to contain the coronavirus outbreak, cybersecurity experts are warning this may spark renewed interest in Bluetooth attacks. They urge developers to ensure such apps are regularly tested for vulnerabilities and release patches swiftly to plug potential holes, while governments should provide assurance that their databases are secure and the data collected will not be used for purposes other than as originally intended. "
dr tech

'So vague, it invites abuse': Twitter reviews controversial new privacy policy | Twitte... - 0 views

  •  
    "Activists swiftly warned that the policy as it was published would backfire. The policy was vague and had been put together without much input from the communities most vulnerable to harassment and doxxing, the activists argued. They had little faith in Twitter's reporting and appeals process, which they described as unreliable, automated and allowing for little discussion about the enforcement of policies."
dr tech

Database allegedly containing ID numbers of 50m Turks posted online | Technology | The ... - 0 views

  •  
    "A database posted online allegedly contains the personal information of 49 million people on the Turkish citizenship database, potentially making more than half of the population of the country vulnerable to identity theft and massive privacy violations."
dr tech

Hundreds of US police forces have distributed malware as "Internet safety software" - B... - 0 views

  •  
    "But Computercop isn't security software -- quite the opposite; it's classic malware. The software, made in New York by a company that markets to law enforcement, is a badly designed keylogger that stores thingstyped into the keyboard -- potentially everything typed on the family PC -- passwords, sensitive communications, banking logins, and more, all stored on the hard drive, either in the clear, or with weak, easily broken encryption. And Computercop users are encouraged to configure the software to email dumps from the keylogger to their accounts (to spy on their children's activity), so that all those keystrokes are vulnerable to interception by anyone between your computer and your email server. "
dr tech

I'm an ex-Facebook exec: don't believe what they tell you about ads | Technology | The ... - 0 views

  •  
    "The ethics of Facebook's micro-targeted advertising was thrust into the spotlight this week by a report out of Australia. The article, based on a leaked presentation, said that Facebook was able to identify teenagers at their most vulnerable, including when they feel "insecure", "worthless", "defeated" and "stressed"."
dr tech

Can Your Genetic Information Be Hacked? - 0 views

  •  
    "Now, researchers warn that these "direct to consumer" services could be vulnerable to a sort of genetic hacking. By uploading selected DNA sequences, they say, it may be possible, for example, to pull out the genomes of most people in a database or to identify people with genetic variants associated with specific traits such as Alzheimer's disease."
1 - 6 of 6
Showing 20 items per page