What is it with the picture and the @ signs? “TheNextWeb” needs some web designers!
We’re just over two weeks into 2019, and one of the biggest data leaks in recent years has surfaced. Today, renowned security researcher Troy Hunt reported a massive leak consisting of 773 million unique email IDs and 21 million unique passwords, which he refers to as Collection #1. Hunt said that multiple people reached out to him […]
Source: 773 million email addresses have been leaked – check if yours is on the list
The Levy-Robinson proposal is no less dangerous a backdoor than any others that have been proposed.
Source: Evaluating the GCHQ Exceptional Access Proposal
Thought we were done with surveillance-law debates, at least for a few years? Not by a long shot. A sunset is looming for three FISA provisions. What’s at stake? Here’s a guide to prep you for the
Source: Three FISA Authorities Sunset in December: Here’s What You Need to
What do you get when you put one internet-connected device on top of another? A little more control than you otherwise would in the case of Alias the “teachable ‘parasite’” — an IoT project smart speaker topper made by two designers, Bjørn Karmann and Tore Knudsen. The Raspberry Pi-powered, fungus-inspired blob’s mission is to whisper […]
Source: Wrest control from a snooping smart speaker with this teachable ‘parasite’
For months, the FBI listened as Mexico’s infamous drug kingpin allegedly trafficked drugs and arranged assassinations. Here’s how.
Source: The Spyware That Brought Down El Chapo’s Drug Empire
Cops can’t just hold an iPhone up to a suspect’s face to search it, judge rules. It could be a landmark decision in modern privacy.
Source: Feds Can’t Force You To Unlock Your iPhone With Finger Or Face, Judge Rules
New deep learning methods tested on video footage groups of animals could be a surveillance hit.
Source: How AI Will Find You In the Crowd, Without Facial Recognition
Last year a string of controversies revealed a darker (and dumber) side to artificial intelligence.
Source: Never mind killer robots—here are six real AI dangers to watch out for in 2019
In the wake of the USMCA’s promotion of the Cross Border Privacy Rules established in 2011 by APEC, a reexamination of the CBPR system is warranted.
Source: Cross-Border Privacy Rules in Asia: An Overview
A new frontier in cyber security is opening. Cyber powers like China are stealing data of private citizens, including Americans. But why exactly?
Source: Weapons of Mass Consumerism: Why China Wants Your Personal Information