Wednesday, August 31, 2016
Dropbox employee’s password reuse led to theft of 60M+ user credentials
Kate Conger, reporting at TechCrunch:
Dropbox disclosed in 2012 that an employee’s password was acquired and used to access a document with email addresses, but did not disclose that passwords were also acquired in the theft. …
Wednesday, August 24, 2016
Secret Cameras Record Baltimore’s Every Move From Above
Pritchett had no idea that as he spoke, a small Cessna airplane equipped with a sophisticated array of cameras was circling Baltimore at roughly the same altitude as the massing clouds. The plane’s wide-angle cameras captured an area of …
Thursday, November 19, 2015
Vizio TVs spy on you, here’s how to disable it
Vizio’s technology works by analyzing snippets of the shows you’re watching, whether on traditional television or streaming Internet services such as Netflix. Vizio determines the date, time, channel of programs — as well as whether you watched …
Tuesday, November 17, 2015
Dan Goodin reports over at Ars Technica on the development of technology which can use inaudible frequencies to tie together multiple unconnected devices. He explains:
The ultrasonic pitches are embedded into TV commercials or are played when a user encounters an ad displayed in a computer browser. …
Thursday, August 13, 2015
Facial Recognition Software Moves From Overseas Wars to Local Police
This is troubling:
Lt. Scott Wahl, a spokesman for the 1,900-member San Diego Police Department, said the department does not require police officers to file a report when they use the facial recognition technology but do not make …
Wednesday, August 12, 2015
The ethics of modern web ad-blocking
Marco Arment, creator of Instapaper and, more recently, Overcast:
This won’t be a clean, easy transition. Blocking pop-ups was much more incisive: it was easy for legitimate publishers to avoid one narrowly-useful Javascript function to open new windows. But …
Friday, November 14, 2014
Americans’ Cellphones Targeted in Secret U.S. Spy ProgramDevlin Barrett reports at The Wall Street Journal:
The program cuts out phone companies as an intermediary in searching for suspects. Rather than asking a company for cell-tower information to help locate a suspect, which law enforcement has …
Wednesday, October 1, 2014
Subprime auto lenders use technology to compel paymentMichael Corkery And Jessica Silver-Greenberg, reporting at the New York Times DealBook blog:
Ms. Bolender was three days behind on her monthly car payment. Her lender, C.A.G. Acceptance of Mesa, Ariz., remotely activated a device in her car’s …
Friday, September 26, 2014
FBI Director dislikes encryption on Apple and Google devicesEncryption of data on mobile devices is a big selling point in our post-Snowden world. But FBI Director James Comes isn’t happy about it:
What concerns me about this is companies marketing something expressly to allow people to place …
Wednesday, September 24, 2014
Anonymous Instagram users role-play with stolen baby photosBlake Miller of Fast Company has this chilling article:
Jenny had become a victim of a growing—and to many, alarming—new community that exists primarily on Instagram: baby role-players. Instagram users like Nikki steal images of babies and …
Tuesday, September 23, 2014
Apple can’t bypass your iOS passcodeApple says in the latest revision of its page on government information requests:
On devices running iOS 8, your personal data such as photos, messages (including attachments), email, contacts, call history, iTunes content, notes, and reminders is placed …
Friday, September 12, 2014
Privacy advocates, tech companies nudge Congress to protect ‘abandoned’ e-mailsThe Email Privacy Act would prevent the government from using mere administrative subpoenas to access email older than 180 days. The distinction, included in the Stored Communications Act , was based on the need for users …
Thursday, February 20, 2014
DHS wants to track license platesICE spokeswoman Gillian Christensen, on the license plate tracking system recently proposed by the Department of Homeland Security:
It is important to note that this database would be run by a commercial enterprise, and the data would be collected and stored by the …
Thursday, January 2, 2014
Facebook scans messages for ad targetingI know this is an unpopular stance, but if you operate on any assumption other than that this happens all the time on myriad services you use, you’re a crazy unrealistic person lacking in the minimum amount of cynicism (read: realism) required to use the …
Tuesday, December 17, 2013
Judges are, and aren’t, competent to rule on intelligence issuesLots to parse on this one, although it looks like a new chapter in the “Surveillance Wars” Edward Snowden started with his leaks.
Two choice quotes really stood out to me in this article, though, especially because they are in …