The Latest in IT Security

1

There has been a flurry of research into using the various sensors on your phone to steal data in surprising ways. Here’s another: using the phone’s ambient light sensor to detect what’s on the screen. It’s a proof of concept, but the paper’s general conclusions are correct.

Read more ...

1

Considering the sweeping regulations and laws meant to safeguard children’s privacy in particular, you might think electronic devices and connected toys for kids would be particularly safe and secure. We generally regard children’s privacy as sacrosanct — kids are particularly vulnerable to advertisers, marketers, predators, and more.

Read more ...

1

Some time ago we tested FindFace, a service that compares photos with the database of avatars from the VK.com social network and looks for matches. Back then, my colleagues had some fascinating findings. I, to my dismay, made an unpleasant discovery.
I did not take part in the testing myself: I was quite busy with other stuff, and besides, I don’t have a VK.com profile.

Read more ...

1

Two powerful U.S. lawmakers are pushing President Donald Trump administration’s to tell them how many of the country’s residents are under surveillance by the National Security Agency. Representatives Bob Goodlatte and John Conyers Jr. asked the Office of the Director of National Intelligence to provide an estimate of the number of U.S. residents whose communications are swept up in NSA surveillance of foreign targets.

Read more ...

Categories

SATURDAY, APRIL 29, 2017

Featured

Archives

Latest Comments

Social Networks