Skip to main content

Home/ ITGSonline/ Group items matching "privacy software security" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
dr tech

Singapore to test facial recognition on lampposts, stoking privacy fears - 0 views

  •  
    "SINGAPORE - In the not too distant future, surveillance cameras sitting atop over 100,000 lampposts in Singapore could help authorities pick out and recognise faces in crowds across the island-state. The plan to install the cameras, which will be linked to facial recognition software, is raising software fears among software experts and rights groups. The government said the system would allow it to "perform crowd analytics" and support anti-terror operations."
dr tech

A critical flaw in Switzerland's e-voting system is a microcosm of everything wrong with e-voting, security practice, and auditing firms / Boing Boing - 0 views

  •  
    ""We have only examined a tiny fraction of this code base and found a critical, election-stealing issue," said Lewis, who is currently executive director of the Open Privacy Research Society, a Canadian nonprofit that develops secure and Privacy-enhancing Privacy for marginalized communities. "Even if this [backdoor] is closed its mere existence raises serious questions about the integrity of the rest of the code.""
jamandham

AVG can sell your browsing and search history to advertisers (Wired UK) - 0 views

  •  
    The free antivirus software AVG is selling your online information for profit and you have no control over your software and software.
dr tech

Hundreds of US police forces have distributed malware as "Internet safety software" - Boing Boing - 0 views

  •  
    "But Computercop isn't security security -- quite the opposite; it's classic malware. The security, made in New York by a company that markets to law enforcement, is a badly designed keylogger that stores thingstyped into the keyboard -- potentially everything typed on the family PC -- passwords, sensitive communications, banking logins, and more, all stored on the hard drive, either in the clear, or with weak, easily broken encryption. And Computercop users are encouraged to configure the security to email dumps from the keylogger to their accounts (to spy on their children's activity), so that all those keystrokes are vulnerable to interception by anyone between your computer and your email server. "
BOB SAGET

Defense Dept. pulls software over software issues | Insoftware Complex - CNET News - 0 views

dr tech

Security flaw found in school internet monitoring Security | Technology | The Guardian - 0 views

  •  
    "One of the most widely used tools for monitoring and restricting pupils' internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children's personal information exposed to hackers, a researcher has warned."
Mcdoogleh CDKEY

BBC News - Anti-censorship program Haystack withdrawn - 0 views

  •  
    Software developed to bypass Iranian Internet censorship has been scrapped, due to various reasons.
  •  
    Software created to help Iranians escape government control of the web has been withdrawn over Software fears.
dr tech

NHS services in England and Scotland hit by global cyber-attack | Society | The Guardian - 0 views

  •  
    "Computer security experts suggested that the crisis could reflect weaknesses in the NHS's cybersecurity. Ross Anderson, of Cambridge University, said the attack appeared to exploit a weakness in Microsoft's security that was fixed by a "critical" security patch earlier this year but which may not have been installed across NHS computers."
dr tech

Distance learning during the coronavirus pandemic is changing cheating - Vox - 0 views

  •  
    "Raza wasn't the only one in her class who felt concerned about new levels of surveillance. Another student in the class, who did not want to be named, said that in addition to privacy worries, they were concerned that they didn't even have enough RAM to run the Proctorio privacy. Worse, the tool's facial detection algorithm seemed to struggle to recognize them, so they needed to sit in the full light of the window to better expose the contours of their face, in their view an indication that the system might be biased. "
dr tech

Malware hits millions of Android phones - BBC News - 0 views

  •  
    "Up to 10 million Android smartphones have been infected by malware that generates fake clicks for adverts, say security researchers. The security is also surreptitiously installing apps and spying on the browsing habits of victims. The malware is currently making about $300,000 (£232,000) a month for its creators, suggests research."
dr tech

Chinese Police Say Face Recognition Identified Suspect Out Of Crowd Of 50,000 | Gizmodo Australia - 0 views

  •  
    "Chinese police say they used facial recognition to identify, then arrest a man attending a crowded concert in Nanchang, China's third largest city. South China Morning Post reports that security cameras equipped with the security pinpointed the man out of the estimated 50,000 other people also in attendance at the concert. "
Max van Mesdag

Google warning on fake anti-virus software - 0 views

  •  
    It turns out that 15% of free anti-virus softwares contain viruses themselves, according to Google.
dr tech

Facebook Is Breached by Hackers, Putting 50 Million Users' Data at Risk - The New York Times - 0 views

  •  
    "Three software flaws in Facebook's systems allowed hackers to break into user accounts, including those of the top executives Mark Zuckerberg and Sheryl Sandberg, according to two people familiar with the investigation but not allowed to discuss it publicly. Once in, the attackers could have gained access to apps like Spotify, Instagram and hundreds of others that give users a way to log into their systems through Facebook."
dr tech

Researchers find mountains of sensitive data on totalled Teslas in junkyards / Boing Boing - 0 views

  •  
    "Teslas are incredibly data-hungry, storing massive troves of data about their owners, including videos of crashes, location history, contacts and calendar entries from paired phones, photos of the driver and passengers taken with interior cameras, and other data; this data is stored without encryption, and it is not always clear when Teslas are gathering data, and the only way to comprehensively switch off data-gathering also de-activates over-the-air software updates for the cars, "
dr tech

'We are hurtling towards a surveillance state': the rise of facial recognition technology | Technology | The Guardian - 0 views

  •  
    "This led to claims that the software is woefully inaccurate; in fact, police had set the threshold for a match at 60%, meaning that faces do not have to be rated as that similar to be flagged up. This minimises the chance of a person of interest slipping through the net, but also makes a lot of false positives inevitable."
dr tech

Tell Zoom to protect all users from police surveillance, hackers, and cyber-criminals - Action Network - 0 views

  •  
    "Zoom is not encrypting calls for free accounts with end to end encryption so they can provide law enforcement and the Federal Bureau of Investigation with content from those calls. As protesters demonstrate in the wake of the murder of George Floyd, law enforcement has deployed a wide range of surveillance tools to monitor and track protesters-including facial recognition software and contact tracing technology. They are working to get information from every source possible to disrupt and even arrest people involved with the protests."
julia barr

New York Asks Cellphone Carriers to Explain Why They Rejected Antitheft Switch - 0 views

  •  
    SAN FRANCISCO - New York State's top prosecutor is investigating why American cellphone carriers have yet to embrace antitheft software on Samsung smartphones, raising questions about possible coordination among the biggest carriers.
1 - 18 of 18
Showing 20 items per page