Tracks

By Valdis Krebs | Who is analyzing the tracks you leave on the Internet?

The False Dream of a Neutral Facebook

Mark Zuckerberg wants the platform to be seen as having a huge effect on voting—but no impact on votes.<p>Donald Trump and Mark Zuckerberg each told partial truths yesterday.<p>First, Trump tweeted that “Facebook was always anti-Trump.” From all available information, it does seem true that the vast …

Facebook

'Our minds can be hijacked': the tech insiders who fear a smartphone dystopia

Google, Twitter and Facebook workers who helped make technology so addictive are disconnecting themselves from the internet. Paul Lewis reports on the Silicon Valley refuseniks alarmed by a race for human attention<p>Justin Rosenstein had tweaked his laptop’s operating system to block Reddit, banned …

Silicon Valley

How Israel Caught Russian Hackers Scouring the World for U.S. Secrets

It was a case of spies watching spies watching spies: Israeli intelligence officers looked on in real time as Russian government hackers searched computers around the world for the code names of American intelligence programs.<p>What gave the Russian hacking, detected more than two years ago, such …

Cybersecurity

Bitcoin Transactions Aren’t as Anonymous as Everyone Hoped - MIT Technology Review

An increasing number of online merchants now offer the ability to pay using the cryptocurrency Bitcoin. One of the great promises of this technology …

As Google Fights Fake News, Voices on the Margins Raise Alarm

SAN FRANCISCO — When David North, the editorial chairman of the World Socialist Web Site, noticed a drop in the site’s traffic in April, he initially chalked it up to news fatigue over President Trump or a shift in political consciousness.<p>But when he dug into the numbers, Mr. North said, he found a …

SEO

Special Report: HP Enterprise let Russia scrutinize cyberdefense system used by Pentagon

WASHINGTON/MOSCOW (Reuters) - Hewlett Packard Enterprise (HPE.N) allowed a Russian defense agency to review the inner workings of cyber defense software used by the Pentagon to guard its computer networks, according to Russian regulatory records and interviews with people with direct knowledge of …

Cybersecurity

Data Breach Exposes Thousands of Job Seekers Citing Top Secret Government Work [Updated]

Thousands of files containing the personal information and expertise of Americans with classified and up to Top Secret security clearances have been …

Security

Their connection, your data.

Why should users care about privacy, and protecting their data from being collected and sold by third parties?<p>To put it simply, your digital data …

Privacy

First Evidence That Social Bots Play a Major Role in Spreading Fake News - MIT Technology Review

Fake news and the way it spreads on social media is emerging as one of the great threats to modern society. In recent times, fake news has been used …

How Russia is using LinkedIn to harass and intimidate Putin’s U.S. critics

Privacy Isn't Dead. It's More Popular Than Ever

One out of every seven people on the planet uses the messaging app WhatsApp every day, according a recent blog post from the company. A billion …

Social Media

How Much Does the US Government Know About Your Sex Life?

Expand A notice of electronic surveillance is posted near a 95-by-50-foot American flag unfurled on the side of an apartment complex in Manchester, …

Surveillance

New Form of Law Enforcement Investigation Hits Close to the Heart

Although it’s widely accepted that police use information from security devices or cellphone data to aid in tracking criminals, a new case has opened …

Privacy

Massive ransomware cyber-attack hits nearly 100 countries around the world

More than 45,000 attacks recorded in countries including the UK, Russia, India and China may have originated with theft of ‘cyber weapons’ from the NSA<p>Global cyber-attack – live updates ‘Accidental hero’ finds kill switch to stop spread<p>A ransomware cyber-attack that may have originated from the …

Cybersecurity

Google revises app review process following phishing attacks

In the wake of the Google Docs phishing debacle last week, Google has added a few new safeguards to better protect us from these types of attacks. The Gmail app for Android scans for suspect links and Google has tightened up its policies on third party authentication to help keep phishing scams …

Phishing

Conspiracy Theorists May Really Just Be Lonely

Conspiracy theorists are often portrayed as nutjobs, but some may just be lonely, recent studies suggest. Separate research has shown that social …

What you need to know about the massive hack that hit the British health-care system and elsewhere

It was first reported in England — hackers gained access to the National Health Service computers, effectively shuttering the entire system. Patients were told to stay home; doctors and nurses were unable to access email or medical records and had to take notes by hand. The hackers demanded a …

Security

Secure Messaging App Wire Stores Everyone You've Ever Contacted in Plain Text

The decision is seemingly a trade-off for usability across multiple devices.<p>The secure messaging marketplace is pretty saturated right now. You've got apps like Signal, that typically put privacy first, and then giants like WhatsApp, that have added end-to-end encryption to its already established …

Encryption

How Peter Thiel’s Palantir Helped the NSA Spy on the Whole World

Donald Trump has inherited the most powerful machine for spying ever devised. How this petty, vengeful man might wield and expand the sprawling …

American Spies: how we got to mass surveillance without even trying | Ars Technica

Review: law prof explains how the road to bad law is paved with good intentions.<p>While <i>American Spies</i> was written prior to Donald Trump winning the …

Surveillance

The ACLU Is in Dublin, Ireland, Today Defending the Right to Privacy for Europeans and Americans Alike

Facebook is cross-examining an ACLU privacy lawyer about U.S. government surveillance.Today, lawyers for Facebook will cross-examine ACLU Staff …

Privacy

Man jailed 16 months, and counting, for refusing to decrypt hard drives | Ars Technica

He’s not charged with a crime. Judge demands he help prosecutors build their case.<p>Francis Rawls, a former Philadelphia police sergeant, has been in …

Privacy

A US-born NASA scientist was detained at the border until he unlocked his phone

Two weeks ago, Sidd Bikkannavar flew back into the United States after spending a few weeks abroad in South America. An employee of NASA’s Jet Propulsion Laboratory (JPL), Bikkannavar had been on a personal trip, pursuing his hobby of racing solar-powered cars. He had recently joined a Chilean …

Immigration

Cellphone Spy Tools Have Flooded Local Police Departments

Major cities throughout the U.S. have spent millions on mobile surveillance tools—but there are still few rules about what happens to the information they capture.<p>A little after midnight on November 28, 2014, hundreds of Black Lives Matter protesters filled the streets of downtown Chicago. The …

Surveillance

String of Baffling Arrests Shakes Cyber Division of FSB

On January 12, 2017, several prominent Russian media outlets reported the imminent dismissal of Andrei Gerasimov, the head of the Federal Security …

Russia

Your Browsing History Alone Can Give Away Your Identity

Researchers have found a way to connect the dots between people’s private online activity and their Twitter accounts—even for people who have never tweeted.<p>Advertisers would give just about anything to be able to lurk over your shoulder as you browse the internet. They want to know what sites you …

Privacy

What Vizio was doing behind the TV screen

By Lesley Fair<br>Consumers have bought more than 11 million internet-connected Vizio televisions since 2010. But according to a complaint filed by the …

Privacy

The art of the troll: New tool reveals egg users’—and Trump’s—posting patterns | Ars Technica

When an account makes 500 posts a day, that's a sure sign that there’s something amiss.<p>President Donald J. Trump loves his Twitter account. Much has …

Social Media

Weapons of Math Destruction: invisible, ubiquitous algorithms are ruining millions of lives

Discussions about big data's role in our society tends to focus on algorithms, but the algorithms for handling giant data sets are all well …

Education