Surveillance State, Privacy & Citizenship

By Wesley Fryer | Articles and thoughts relating to our modern surveillance state (government and corporate) as well as privacy and citizenship. by @wfryer

More than 480 web firms record 'every keystroke'

<b>Hundreds of web firms are tracking every single keystroke made by visitors, a study from Princeton University has suggested.</b><p>The technique - known as session replay - is used by companies to gain an understanding of how customers use websites.<p>More than 480 websites used the technique, according to …

Privacy

ProtonMail launches an encrypted contacts manager to protect journalists' sources

ProtonMail, a secure email service, is launching an encrypted contacts manager today for its users. The manager provides "zero access" to contacts, ProtonMail says, meaning the company can't view what users have saved. It also features a digital signature that should prevent anyone from …

Encryption

More than 400 of the most popular sites are logging everything you type

Researchers at Princeton University have uncovered one of the biggest security flaws on the internet<p>For years, keyloggers have been synonymous with …

Information Security

How a Wi-Fi Pineapple Can Steal Your Data (And How to Protect Yourself From It)

The Wi-Fi Pineapple enables anyone to steal data on public Wi-Fi networks. Here’s how it facilitates two sophisticated network attacks and how to protect yourself against them.<p><i>This article is part of</i> How Hacking Works<i>, Motherboard's guide to demystifying information security.</i><p>In popular media, …

Wi-Fi

We Can’t Trust Facebook to Regulate Itself

I led Facebook’s efforts to fix privacy problems on its developer platform in advance of its 2012 initial public offering. What I saw from the inside was a company that prioritized data collection from its users over protecting them from abuse. As the world contemplates what to do about Facebook in …

Marketing

Dark Cloud: Inside The Pentagon's Leaked Internet Surveillance Archive

Surveillance

Security News This Week: The Pentagon Left Data Exposed in the Cloud

Well, it’s been a wild and wooly week for security, especially for Face ID, which a group of hackers at a Vietnamese security firm convincingly claim …

Security

Pentagon mass surveillance slurped up the world's social media traffic; then they dumped it on a publicly accessible Amazon cloud server

The Upguard Cyber Risk Team has found three Department of Defense mass-storage "buckets" on Amazon that are world-viewable, containing 1.8 billion of …

Surveillance

The Dark Side of 'Replay Sessions' That Record Your Every Move Online

When internet users visit Walgreens.com, a software company may record every keystroke, mouse movement and scroll, potentially exposing medical …

Privacy

OnePlus backdoor means hackers could take over your phone

Software called EngineerMode means hackers could do whatever they want with a phone as long as they have it in hand.<p>Hackers who get hold of some OnePlus phones can get virtually unlimited access to their files and software through use of a testing tool called called EngineerMode the company …

OnePlus

Report: NSA Hunts for Moles Amid Crippling Information Leaks

The National Security Agency has spent more than a year investigating a series of catastrophic breaches and has yet to determine whether it’s …

National Security Agency (NSA)

Latest NSA breach "far exceeds" Edward Snowden leaks

"Deep Security Breach Cripples N.S.A.," says the stark headline atop today's N.Y. Times front page. "Mysterious Group Steals Powerful Hacking …

National Security Agency (NSA)

Encryption against global mass surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides …

Linux

Third-party password breaches are the easiest means for hackers to break into your Gmail accounts: Google

Account hijacks is quickly growing into a problem. The issue does not arise because of the lack of security on the side of the account provider, but …

Security

Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core

WASHINGTON — Jake Williams awoke last April in an Orlando, Fla., hotel where he was leading a training session. Checking Twitter, Mr. Williams, a cybersecurity expert, was dismayed to discover that he had been thrust into the middle of one of the worst security debacles ever to befall American …

Security

How to install Tor for Chrome for even more private browsing

If you want the anonymity of the Tor network, but would rather use the Chrome browser, you're not out of luck. Jack Wallen shows you how to make this …

Linux

Wikileaks release reveals CIA impersonated Kaspersky Lab while hacking people

The latest release by Wikileaks of leaked top secret U.S. government files has revealed that the Central Intelligence Agency created and used code …

Security

UK bulk spying challenge in European Court of Human Rights

Legal representatives of the UK government faced a raft of questions today from judges sitting in the European Court of Human Rights hearing a challenge to intelligence agencies’ bulk collection practices brought by a coalition of civil and human rights campaigners.<p>The American Civil Liberties …

Surveillance

Big Brother isn't just watching: workplace surveillance can track your every move

Employers are using a range of technologies to monitor their staff’s web-browsing patterns, keystrokes, social media posts and even private messaging apps<p>How can an employer make sure its remote workers aren’t slacking off? In the case of talent management company Crossover, the answer is to take …

Surveillance

Equifax Reopens Salary Lookup Service — Krebs on Security

<b>Equifax</b> has re-opened a Web site that lets anyone look up the salary history of a large portion of the American workforce using little more than a …

Identity Theft

Do You Really Need to Pay for an Identity Theft Protection Service?

With all the data breaches and hacking going on these days, it's hard not to be paranoid. But can identity theft protection services really keep you …

Identity Theft

59% of Employees Hit by Ransomware at Work Paid Ransom Out of Their Own Pockets

A survey of more than 1,000 office workers carried out by business cloud services provider Intermedia has revealed that 59% of employees that had …

Identity Theft

How to Secure your Home Wi-Fi Network Yourself

By admin<p>In Cyber, Cybersecurity, Encryption, Privacy, Security<p>0<p>Follow me<p>Anyone within range of a home WI-FI network can potentially hack into it. If …

Wi-Fi

How to Set Up Google's Advanced Protection Program

The process is pretty straightforward, but be prepared to buy two security keys if you don't already own them.<p>PCMag reviews products independently, …

Google

Should you cover your webcam?

Webcams have presented a security liability for years, yet many of us don't cover them up. Should we? Edward Snowden, Mark Zuckerberg, and former FBI director James Comey all seem to — but none of us are celebrities or heads of state, so what good does it do us?<p>Well, not much! Tape might give you …

Edward Snowden

Ransomware victims are paying the ransom in record numbers

Intermedia examined the critical security behavioral habits of more than 1,000 office workers. Ransomware attacks continue to grow exponentially The …

Cybersecurity

Businesses unprepared for cyber attacks, warn cyber professionals

IT Security teams are on the verge of a huge crisis, a poll of CISOs, CIOs and senior cyber professionals has revealed.<p>The cyber professionals …

Cybersecurity

How to sell cybersecurity to your executive team

Despite repeated major, high-profile breaches, most cybersecurity teams still struggle to get sufficient funding.<p>“After this hack, cybersecurity …

Cybersecurity

Buy All Your Employees a Smartphone. Your Job Might Depend on It

When smartphones are stupid: Android devices and iPhones have emerged as a primary work tool for many workers -- and hackers know it.<p>You're going to love your new iPhone X. And the best part? Totally free. (Maybe.)<p>Remember BYOD (bring your own device)? When the BYOD craze started, company officials …

BYOD