Cybersecurity News


Give up Google, don't hit 'accept all': how to fight for your privacy

Give up Google, don't hit 'accept all': how to fight for your privacy

In Privacy Is Power, professor Carissa Véliz has made a shocking survey of how much intimate data we are surrendering. But she has a plan to fight back

“If you’re reading this book, you probably already know your personal data is being collected, stored and analysed,” Carissa Véliz begins, in Privacy Is Power. Her challenge, as a writer and a privacy advocate, is to shake us out of our complacency; to persuade us to see this not as a necessary sacrifice in the digital age, but an intolerable invasion. From the mounting dread I felt while reading Privacy Is Power, I’d say she was successful.

From the moment you wake up and first check your phone, to the marketers that infer your mood from your music choices, to the smart speaker that shares your private conversations, or the television that listens in on them (from the terms and conditions of a Samsung smart TV: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured”), there is nowhere to hide – or even just be – in this hyper-connected hellscape. Corporations can track you both by your face and your digital footprint, your medical records may be handed over to Big Tech, and advertisers may learn of your break-up before you do. In her book, Véliz, a professor at the Institute for Ethics in AI at Oxford University, often veers into the second person, cleverly underscoring her point: it’s impossible not to picture yourself blindly navigating this horror, then you remember - you already are.

Think twice before sharing. Before you post something, think how it might be used against you.

In Japan last year, a man sexually assaulted a pop star, claiming he had found her by analysing reflections in her eyes in photos she had posted online

Related: Government admits breaking privacy law with NHS test and trace

Privacy Is Power: Why and How You Should Take Back Control of Your Data, by Carissa Véliz is published by Bantam Press. To order a copy, go to guardianbookshop.com.

Continue reading...
28 September 2020

Joker Trojans Flood the Android Ecosystem

Joker Trojans Flood the Android Ecosystem September saw dozens of Joker malware variants hitting Google Play and third-party app stores.
28 September 2020

UHS hospital network hit by ransomware attack

UHS operates more than 400 hospitals across the US and UK. Some US hospitals have been down since Sunday.
28 September 2020

Twitter Warns Developers of API Bug That Exposed App Keys, Tokens

Twitter Warns Developers of API Bug That Exposed App Keys, Tokens Twitter has fixed a caching issue that could have exposed developers' API keys and tokens.
28 September 2020

9 Tips to Prepare for the Future of Cloud & Network Security

9 Tips to Prepare for the Future of Cloud & Network Security Cloud and network security analysts outline trends and priorities businesses should keep top of mind as they grow more reliant on cloud.
28 September 2020

Safeguarding Schools Against RDP-Based Ransomware

How getting online learning right today will protect schools, and the communities they serve, for years to come.
28 September 2020

MFA-Minded Attackers Continue to Figure Out Workarounds

While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.
28 September 2020

MFA-Minded Attackers Continue to Figure Out Workarounds

While MFA can improve overall security posture, it's not a "silver bullet" -- and hacks continue.
28 September 2020

Suspicious logins & RATs reported after ransomware attack on US govt contractor

Ransomware attack on Tyler Technologies is looking worse by the day.
28 September 2020

Students rise up against forced remote spy app usage in colleges, universities

Recent clashes highlight concerns that forcing students to use remote exam monitoring software is an affront to personal privacy.
28 September 2020

Google removes 17 Android apps doing WAP billing fraud from the Play Store

The 17 apps were infected with the Joker (Bread) malware, which Google described in January 2020 as one of the most persistent threats it dealt with since 2017.
27 September 2020

Bug Bounty FAQ: Top Questions, Expert Answers

Bug Bounty FAQ: Top Questions, Expert Answers Four leading voices in the bug bounty community answer frequently asked questions from bounty hunters, companies and curious cybersecurity professionals.
26 September 2020

KuCoin cryptocurrency exchange hacked for $150 million

KuCoin said an intruder drained all its hot wallets today.
26 September 2020

Pastebin adds 'Burn After Read' and 'Password Protected Pastes' to the dismay of the infosec community

The two new features will make it easier to disguise malware operations.
26 September 2020

FortiGate VPN Default Config Allows MitM Attacks

FortiGate VPN Default Config Allows MitM Attacks The client's default configuration for SSL-VPN has a certificate issue, researchers said.
25 September 2020

6 Things to Know About the Microsoft 'Zerologon' Flaw

Until all domain controllers are updated, the entire infrastructure remains vulnerable, the DHS' CISA warns.
25 September 2020

Industrial Cyberattacks Get Rarer but More Complex

Industrial Cyberattacks Get Rarer but More Complex The first half of 2020 saw decreases in attacks on most ICS sectors, but oil/gas firms and building automation saw upticks.
25 September 2020

Ring’s Flying In-Home Camera Drone Escalates Privacy Worries

Ring’s Flying In-Home Camera Drone Escalates Privacy Worries Privacy fears are blasting off after Amazon's Ring division unveiled the new Always Home Cam, a smart home security camera drone.
25 September 2020

Navigating the Asia-Pacific Threat Landscape: Experts Dive In

At next week's virtual Black Hat Asia, threat intelligence pros will discuss the threats local organizations should prioritize and how they can prepare.
25 September 2020

Getting Over the Security-to-Business Communication Gap in DevSecOps

Application security in a DevOps world takes more than great teamwork among security, developers, and operations staff.
25 September 2020