Spyglass

By Tigerulze | A survey of surveillance

Breach of Deloitte email system in March comes to light

Accountancy firm Deloitte has suffered a data breach that has resulted in the leaking of confidential emails and the plans of some of its clients.<i>The</i> …

Security

The Equifax hack and how to protect your family — all explained in 5 minutes

A failure to patch<p>On March 7, the developers of Apache Struts — a Java web development framework popular with large companies — released a critical …

Identity Theft

Sloppy U.S. Spies Misused Covert Network for Personal Shopping — and Other Stories from Internal NSA Documents

NSA agents successfully targeted “the entire business chain” connecting foreign cafes to the internet, bragged about an “all-out effort” to spy on …

National Security Agency (NSA)

Equifax Data Breach is a 10 out of 10 Scandal

NEP’s Bill Black appears on The Real News Network and discussing the hacking of consumer credit reporting giant Equifax, and the company’s ‘cynical’ …

Security

Australians' financial information at risk in data breach of US company

Australians could be caught up in an enormous hack of sensitive personal financial data that has left nearly half the American population at risk of …

Identity Theft

US credit info provider leaks 143m user details

American credit information provider Equifax has disclosed that it learned on 29 July of a leak that involved the details of 143 million …

Security

QLD police could use your smart fridge as a listening device

The tough new laws designed to boost the response capabilities of police during a terrorist emergency give authorities the ability to use existing …

Surveillance

London police facial recognition tech falls flat on its face

Facial recognition technology used by London's Met police at the Notting Hill Carnival for the second consecutive year was unable to tell the …

Notting Hill Carnival

Thousands of mercenary resumés found exposed on Web

The resumés of thousands vying to get jobs as mercenaries with TigerSwan, a North Carolina-based private security firm, have been found exposed to …

Security

How to Use the Tor Network on Your iOS Device

Your Internet Service Provider (as well as other less than reputable parties), can monitor your every move on the internet. Plus, they can share that …

iOS

More than 700m email addresses found on Dutch server

A researcher known as Benkow, based in Paris, has discovered a list of 711 million email addresses, servers and passwords on a Web server in the …

Security

The Companies That Will Track Any Phone on the Planet

Tracking or tapping phones across the planet used to be a niche capability. Now, a myriad of for-profit spy companies sell border-crossing surveillance of mobile phones.<p>As soon as the target switches the phone on, it’s already too late. Digital spies have pinpointed the phone’s location and, …

Surveillance

Who killed Dr Kelly? - The Justinian Archive - Justinian: Australian legal magazine. News on lawyers and the law

<b>IN</b> a review of Donald McRae’s book, <i>The Old Devil: Clarence Darrow, the World’s Greatest Trial Lawyer</i>, published by Simon & Schuster, <i>The Guardian’s</i> …

Texting drivers, beware: new cameras may have you covered

Australian police could soon implement new roadside cameras that can catch you doing more than just speeding.According to an investigation by <i>Wheels</i> …

Mobile

AccuWeather iOS app sends info to data monetisation firm: claim

A security researcher claims that the AccuWeather app for iOS leaks information to a third-party site, with GPS co-ordinates and router information …

Mobile

Hacked smart devices double as surveillance tools, new research finds

Why it matters to you<p>The research suggests that smart devices can be exploited as surveillance tool, so it's wise to be more cognizant about the …

Surveillance

Hackers Show How Smart Devices Could Use Sonar to Spy On You

A team of student hackers have demonstrated a method for using music to turn smart devices into tools for spying. The system is based on sonar, and …

Facial recognition tech turns people into ‘waking ID cards,’ warn privacy activists

Police force use of facial recognition technology in public spaces risks turning people into “walking ID cards,” a civil rights group has told RT.<p>Campaign director at Privacy International, Harmit Kambo, said the technology, which scans people’s faces against a mass database of facial profiles, …

Chicago voter database left open on Amazon cloud

The entire database of 1.8 million Chicago voters was left open to all and sundry on an Amazon cloud-based storage site which was configured for …

Security

Justice demands 1.3M IP addresses related to Trump resistance site

Web hosting provider challenging request for info on anti-Trump website used to organize Inauguration protests.

Inauguration Day

Your 'Anonymous' Browsing Data Isn't Actually Anonymous

Researchers said it was "trivial" to identify users and view their browsing habits in purchased 'anonymous' browsing data.<p>In August 2016, a data broker received a phone call from a woman named Anna Rosenberg, who worked for a small startup in Tel Aviv. Rosenberg claimed she was training a neural …

Privacy

In China, Surveillance Feeds Become Reality TV

BEIJING—They may be blocked from watching YouTube, but China’s 751 million internet users can binge on real-time video streams of yoga studios, swimming lessons, alpaca ranches and thousands of other scenes captured by surveillance cameras.<p>Much of what’s available would be unthinkable in the West, …

Surveillance

Cyber threats prompt return of radio for ship navigation

LONDON (Reuters) - The risk of cyber attacks targeting ships' satellite navigation is pushing nations to delve back through history and develop back-up systems with roots in World War Two radio technology.<p>Ships use GPS (Global Positioning System) and other similar devices that rely on sending and …

U.S. Coast Guard

Woolworths IT glitch slugs customers with not-so-fresh bills

Angry Woolworths customers say they have had money withdrawn from their accounts because of a computer glitch that has re-processed six-month-old …

Banking

How the CIA Came to Doubt the Official Story of JFK’s Murder

Newly released documents from long-secret Kennedy assassination files raise startling questions about what top agency officials knew and when they knew it.<p>After the assassination of President John F. Kennedy in November 1963, the CIA appeared eager, even desperate, to embrace the version of events …

History

Cyber expert who ended WannaCry virus attack arrested by FBI

The cyber security researcher widely credited with helping to neutralise the global WannaCry ransomware attack earlier this year is in FBI custody …

Las Vegas

Google definitely knows your deepest, darkest secrets

Created as a tool for searching the vast expanses of the internet, Google is also sucking up information about its users. It may just be the best …

Google

Privacy Isn't Dead. It's More Popular Than Ever

One out of every seven people on the planet uses the messaging app WhatsApp every day, according a recent blog post from the company. A billion …

Hackers steal points from Woolworths rewards cards

Hackers appear to have stolen from Woolworths customers by accessing their rewards cards through a flaw in the app.<p>Customers took to OzBargain to …

Security