Spy pixels in emails have become endemic
The use of "invisible" tracking tech in emails is now "endemic", according to a messaging service that analysed its traffic at the BBC's request.
Hey's review indicated that two-thirds of emails sent to its users' personal accounts contained a "spy pixel", even after excluding for spam.
Its makers said that many of the largest brands used email pixels, with the exception of the "big tech" firms.
Defenders of the trackers say they are a commonplace marketing tactic.
And several of the companies involved noted their use of such tech was mentioned within their wider privacy policies.
βΌοΈ Emails pixels can be used to log:
β if and when an email is opened
β how many times it is opened
β what device or devices are involved
β the user's rough physical location, deduced from their internet protocol (IP) address - in some cases making it possible to see the street the recipient is on
This information can then be used to determine the impact of a specific email campaign, as well as to feed into more detailed customer profiles.
Hey's co-founder David Heinemeier Hansson says they amount to a "grotesque invasion of privacy".
https://www.bbc.com/news/technology-56071437
#spy #pixels #email #invisible #tracking #bigtech #BigData #thinkabout
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
The use of "invisible" tracking tech in emails is now "endemic", according to a messaging service that analysed its traffic at the BBC's request.
Hey's review indicated that two-thirds of emails sent to its users' personal accounts contained a "spy pixel", even after excluding for spam.
Its makers said that many of the largest brands used email pixels, with the exception of the "big tech" firms.
Defenders of the trackers say they are a commonplace marketing tactic.
And several of the companies involved noted their use of such tech was mentioned within their wider privacy policies.
βΌοΈ Emails pixels can be used to log:
β if and when an email is opened
β how many times it is opened
β what device or devices are involved
β the user's rough physical location, deduced from their internet protocol (IP) address - in some cases making it possible to see the street the recipient is on
This information can then be used to determine the impact of a specific email campaign, as well as to feed into more detailed customer profiles.
Hey's co-founder David Heinemeier Hansson says they amount to a "grotesque invasion of privacy".
https://www.bbc.com/news/technology-56071437
#spy #pixels #email #invisible #tracking #bigtech #BigData #thinkabout
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Bbc
'Spy pixels in emails have become endemic'
Email app Hey reveals that two-thirds of the messages it handles contain the hidden trackers.
Password manager: LastPass restricts free version
Users of the free version of LastPass will only be able to use the password manager across devices to a limited extent from March.
Starting in March and then again in May, the LastPass developers want to reduce the functionality of the free version. The password manager is available for popular systems such as Android, iOS and Windows. Users have access to their passwords stored in the password vault on all devices.
https://blog.lastpass.com/2021/02/changes-to-lastpass-free/
#LastPass #password #manager
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Users of the free version of LastPass will only be able to use the password manager across devices to a limited extent from March.
Starting in March and then again in May, the LastPass developers want to reduce the functionality of the free version. The password manager is available for popular systems such as Android, iOS and Windows. Users have access to their passwords stored in the password vault on all devices.
https://blog.lastpass.com/2021/02/changes-to-lastpass-free/
#LastPass #password #manager
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Lastpass
Changes to LastPass Free - The LastPass Blog
Update as of May 20, 2021 Free users will continue to receive support for technical issues until August 23, 2021 to assist through the transition of selecting an active device type. After this dat[..]
The last search engine
Gigablast is the only non-Big Tech search engine in the U.S. that still crawls the web.
Big Tech is censoring Gigablast from indexing the "public" web.
π‘ Cloudflare, Google, Bing Destroying the Infrastructure of the Free Web
https://www.gigablast.com/blog.html#anti
https://www.gigablast.com/
#gigablast #search #engine #cloudflare #google #bing #thinkabout
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Gigablast is the only non-Big Tech search engine in the U.S. that still crawls the web.
Big Tech is censoring Gigablast from indexing the "public" web.
π‘ Cloudflare, Google, Bing Destroying the Infrastructure of the Free Web
https://www.gigablast.com/blog.html#anti
https://www.gigablast.com/
#gigablast #search #engine #cloudflare #google #bing #thinkabout
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
China steps up online controls with new rule for bloggers
TAIPEI, Taiwan (AP) β Ma Xiaolin frequently wrote about current affairs on one of Chinaβs leading microblogging sites, where he has 2 million followers. But recently, he said in a post, the Weibo site called and asked him not to post original content on topics ranging from politics to economic and military issues.
βAs an international affairs researcher and a columnist, it looks like I can only go the route of entertainment, food and beverage now,β the international relations professor wrote on Jan. 31.
Ma, who often posted on developments in the Mideast, is one of many popular influencers working within the constraints of Chinaβs heavily censored web who is finding that their space to speak is shrinking even further with the latest policy changes and a clean-up campaign run by the countryβs powerful censors. He declined an interview request.
Beginning next week, the Cyberspace Administration of China will require bloggers and influencers to have a government-approved credential before they can publish on a wide range of subjects. Some fear that only state media and official propaganda accounts will get permission. While permits have been needed since at least 2017 to write about topics such as political and military affairs, enforcement has not been widespread. The new rules expand that requirement to health, economics, education and judicial matters.
βThe regulators want to control the entire procedure of information production,β said Titus Chen, an expert in Chinese social media policy at National Sun Yat-Sen University in Taiwan.
https://apnews.com/article/taiwan-china-coronavirus-pandemic-blogging-50170ca73ed1f25ae769723e86c4d169
#china #blogging #microblogging #rules #netpolitics #thinkabout #why
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
TAIPEI, Taiwan (AP) β Ma Xiaolin frequently wrote about current affairs on one of Chinaβs leading microblogging sites, where he has 2 million followers. But recently, he said in a post, the Weibo site called and asked him not to post original content on topics ranging from politics to economic and military issues.
βAs an international affairs researcher and a columnist, it looks like I can only go the route of entertainment, food and beverage now,β the international relations professor wrote on Jan. 31.
Ma, who often posted on developments in the Mideast, is one of many popular influencers working within the constraints of Chinaβs heavily censored web who is finding that their space to speak is shrinking even further with the latest policy changes and a clean-up campaign run by the countryβs powerful censors. He declined an interview request.
Beginning next week, the Cyberspace Administration of China will require bloggers and influencers to have a government-approved credential before they can publish on a wide range of subjects. Some fear that only state media and official propaganda accounts will get permission. While permits have been needed since at least 2017 to write about topics such as political and military affairs, enforcement has not been widespread. The new rules expand that requirement to health, economics, education and judicial matters.
βThe regulators want to control the entire procedure of information production,β said Titus Chen, an expert in Chinese social media policy at National Sun Yat-Sen University in Taiwan.
https://apnews.com/article/taiwan-china-coronavirus-pandemic-blogging-50170ca73ed1f25ae769723e86c4d169
#china #blogging #microblogging #rules #netpolitics #thinkabout #why
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
AP NEWS
China steps up online controls with new rule for bloggers
TAIPEI, Taiwan (AP) β Ma Xiaolin frequently wrote about current affairs on one of China's leading microblogging sites, where he has 2 million followers...
LibreOffice team say they are working on a WebAssembly port
Developers hope to deliver a working example in the next few months.
Developers are reportedly getting close to bringing LibreOffice, the popular open source alternative to Microsoft Office, to the web browser using WebAssembly (WASM).
The project already offers LibreOffice Online as a collaborative, web-based version of LibreOffice. However, you can only really use it through its Collabora Online commercial variant.
Even as the Documentation Foundation (TDF), which helps develop and maintain LibreOffice, claims that it βis not planning to develop and fund a cloud solution similar to existing products from Google and Microsoft,β the developers of the WASM port hope to deliver a working demo by summer 2021.
https://www.techradar.com/news/libreoffice-team-say-they-are-working-on-a-webassembly-port
#libreoffice #opensource #webassembly #wasm #tdf
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Developers hope to deliver a working example in the next few months.
Developers are reportedly getting close to bringing LibreOffice, the popular open source alternative to Microsoft Office, to the web browser using WebAssembly (WASM).
The project already offers LibreOffice Online as a collaborative, web-based version of LibreOffice. However, you can only really use it through its Collabora Online commercial variant.
Even as the Documentation Foundation (TDF), which helps develop and maintain LibreOffice, claims that it βis not planning to develop and fund a cloud solution similar to existing products from Google and Microsoft,β the developers of the WASM port hope to deliver a working demo by summer 2021.
https://www.techradar.com/news/libreoffice-team-say-they-are-working-on-a-webassembly-port
#libreoffice #opensource #webassembly #wasm #tdf
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
TechRadar
LibreOffice team say they are working on a WebAssembly port
Youβll soon be able to use the office suite from within a web browser. Again.
85: Cam the Carder
Darknetdiaries - EP 85: Cam the Carder
This is the story of Cam Harrison, aka βkilobitβ and his rise and fall as a prominent carder.
https://darknetdiaries.com/episode/85/
#truecrime #darknetdiaries #podcast
π@cRyPtHoN_INFOSEC_FR
π@cRyPtHoN_INFOSEC_EN
π@cRyPtHoN_INFOSEC_DE
π@BlackBox_Archiv
π@NoGoolag
This is the story of Cam Harrison, aka βkilobitβ and his rise and fall as a prominent carder.
https://darknetdiaries.com/episode/85/
#truecrime #darknetdiaries #podcast
π@cRyPtHoN_INFOSEC_FR
π@cRyPtHoN_INFOSEC_EN
π@cRyPtHoN_INFOSEC_DE
π@BlackBox_Archiv
π@NoGoolag
Behind the scenes of CityBee customer data leak
Introduction
All of this is obviously for educational and informative purpose. And I do not support any sort of crime either.
All of the information below comes from the researcher himself from his interview and some of my own tests obviously. :D
Well what even is CityBee you may ask?
It is a car, bike and scooter rental service in Lithuania.
And oh yes they store some data (can tell that just by looking at their homepage).
https://kernal.eu/posts/citybee-leak/
#citybee #lithuania #data #leak
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Introduction
All of this is obviously for educational and informative purpose. And I do not support any sort of crime either.
All of the information below comes from the researcher himself from his interview and some of my own tests obviously. :D
Well what even is CityBee you may ask?
It is a car, bike and scooter rental service in Lithuania.
And oh yes they store some data (can tell that just by looking at their homepage).
https://kernal.eu/posts/citybee-leak/
#citybee #lithuania #data #leak
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
When did "privacy issues" start to mean "too much privacy"?
Clubhouse draws the ire of journalists
I understand that every social media platform has to deal with misinformation, but I was surprised by the harassment and privacy issues the subtitle referred to.
My understanding of Clubhouse was that it was for pseudo-private conversations. Unless the app is leaking out information, I canβt imagine privacy to be an issue.
The NY Times article has one brief mention about privacy:
"This month, German and Italian regulators publicly questioned whether Clubhouseβs data practices complied with European data protection laws. And China blocked the app after political conversations popped up on it outside the countryβs tight internet controls."
In another article linked to by the NY Times article provides more clarity regarding privacy:
"On Clubhouse, however, there are no screenshots. There is no way to drag up old Clubhouse posts years later like a user might do on Twitter. There is no way to record conversationsβmeaning there is no way to prove that someone said anything controversial at all. Thereβs no path to accountability. Users on Clubhouse know, or at least believe, that they can openly speak their mind with zero repercussions. Platforms like Twitter and Facebook have implemented robust moderation programs in recent years, a move that has been both praised and criticized by many."
This sounds like a feature, not a bug. Just between you and me, I donβt record any of my Zoom calls with friends. Just donβt mention it to any journalists.
https://mleverything.substack.com/p/when-did-privacy-issues-start-to
https://datenschutz-hamburg.de/assets/pdf/2021-02-02-press-release-clubhouse.pdf
#clubhouse #privacy
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Clubhouse draws the ire of journalists
I understand that every social media platform has to deal with misinformation, but I was surprised by the harassment and privacy issues the subtitle referred to.
My understanding of Clubhouse was that it was for pseudo-private conversations. Unless the app is leaking out information, I canβt imagine privacy to be an issue.
The NY Times article has one brief mention about privacy:
"This month, German and Italian regulators publicly questioned whether Clubhouseβs data practices complied with European data protection laws. And China blocked the app after political conversations popped up on it outside the countryβs tight internet controls."
In another article linked to by the NY Times article provides more clarity regarding privacy:
"On Clubhouse, however, there are no screenshots. There is no way to drag up old Clubhouse posts years later like a user might do on Twitter. There is no way to record conversationsβmeaning there is no way to prove that someone said anything controversial at all. Thereβs no path to accountability. Users on Clubhouse know, or at least believe, that they can openly speak their mind with zero repercussions. Platforms like Twitter and Facebook have implemented robust moderation programs in recent years, a move that has been both praised and criticized by many."
This sounds like a feature, not a bug. Just between you and me, I donβt record any of my Zoom calls with friends. Just donβt mention it to any journalists.
https://mleverything.substack.com/p/when-did-privacy-issues-start-to
https://datenschutz-hamburg.de/assets/pdf/2021-02-02-press-release-clubhouse.pdf
#clubhouse #privacy
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Substack
When did "privacy issues" start to mean "too much privacy"?
Clubhouse draws the ire of journalists
Dogecoin Has a Top Dog Worth $2.1 Billion
A single digital address appears to have accumulated holdings in dogecoin, the cryptocurrency that was started as a joke
The dogecoin market has a pack leader.
Records show that a person, or entity, owns about 28% of all of the cryptocurrency in circulationβa stake worth about $2.1 billion at current prices. The holderβs identity isnβt known, which is common in the opaque world of digital currencies.
It is hard to tell what to make of this giant position in what has long been a small and niche corner of the cryptocurrency world.
Dogecoin was created in 2013 as a satirical homage to bitcoin. Its developers were riffing off the meme of a Shiba Inu dog with bad spelling habits. It wasnβt designed to be used as a form of payment, or as anything except a joke. At the start of 2021, a dogecoin was worth about half a cent, even as bitcoin prices had surged to nearly $30,000.
https://telegra.ph/Dogecoin-Has-a-Top-Dog-Worth-21-Billion-02-17
via www.wsj.com
#dogecoin #cryptocurrency
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
A single digital address appears to have accumulated holdings in dogecoin, the cryptocurrency that was started as a joke
The dogecoin market has a pack leader.
Records show that a person, or entity, owns about 28% of all of the cryptocurrency in circulationβa stake worth about $2.1 billion at current prices. The holderβs identity isnβt known, which is common in the opaque world of digital currencies.
It is hard to tell what to make of this giant position in what has long been a small and niche corner of the cryptocurrency world.
Dogecoin was created in 2013 as a satirical homage to bitcoin. Its developers were riffing off the meme of a Shiba Inu dog with bad spelling habits. It wasnβt designed to be used as a form of payment, or as anything except a joke. At the start of 2021, a dogecoin was worth about half a cent, even as bitcoin prices had surged to nearly $30,000.
https://telegra.ph/Dogecoin-Has-a-Top-Dog-Worth-21-Billion-02-17
via www.wsj.com
#dogecoin #cryptocurrency
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Telegraph
Dogecoin Has a Top Dog Worth $2.1 Billion
The dogecoin market has a pack leader. Records show that a person, or entity, owns about 28% of all of the cryptocurrency in circulationβa stake worth about $2.1 billion at current prices. The holderβs identity isnβt known, which is common in the opaque worldβ¦
Facebook's Australian news ban also blocked links to weather, government services, poetry, and Facebook itself
Australians woke up on Thursday morning to find their news feeds, post history, and favourite news outlets' pages scrubbed of all links to ... well, news.
Facebook followed through on its threat to ban the sharing of news links by and to Australian users, as the country's government moves closer to forcing big tech companies to pay to link media outlets' content.
The proposed news media bargaining code would see tech giants like Google and Facebook having to pay media companies for content that appears on their platforms. While Google initially threatened to pull out of Australia over the law, which has bipartisan support, it instead struck deals with dozens of platforms to pay them for content via its News Showcase. Facebook, in contrast, has chosen to take its bat and ball and go home like a big sulky baby.
But the ban's not just affecting local, national, and international news outlets.
It's also affected government websites like the Bureau of Meteorology, state governments, and health agencies; satirical news sites, like the Onion-esque larrikin "local news" The Betoota Advocate; organisations like the Australian Council of Trade Unions; and even literary journals.
https://mashable.com/article/facebook-news-ban-australia-effects
#DeleteFacebook #facebook #australia #newsban
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Australians woke up on Thursday morning to find their news feeds, post history, and favourite news outlets' pages scrubbed of all links to ... well, news.
Facebook followed through on its threat to ban the sharing of news links by and to Australian users, as the country's government moves closer to forcing big tech companies to pay to link media outlets' content.
The proposed news media bargaining code would see tech giants like Google and Facebook having to pay media companies for content that appears on their platforms. While Google initially threatened to pull out of Australia over the law, which has bipartisan support, it instead struck deals with dozens of platforms to pay them for content via its News Showcase. Facebook, in contrast, has chosen to take its bat and ball and go home like a big sulky baby.
But the ban's not just affecting local, national, and international news outlets.
It's also affected government websites like the Bureau of Meteorology, state governments, and health agencies; satirical news sites, like the Onion-esque larrikin "local news" The Betoota Advocate; organisations like the Australian Council of Trade Unions; and even literary journals.
https://mashable.com/article/facebook-news-ban-australia-effects
#DeleteFacebook #facebook #australia #newsban
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Forwarded from NoGoolag
Reminder that there's a Nogoolag group and that you're missing most of the discussions if you're just commenting on the channel
Join: https://t.iss.one/joinchat/RfYPt67LSOB3BO6S
Join: https://t.iss.one/joinchat/RfYPt67LSOB3BO6S
Facebook Takes Down Myanmar Military's Page
"In line with our global policies, we've removed the Tatmadaw True News Information Team Page from Facebook for repeated violations of our Community Standards prohibiting incitement of violence and coordinating harm," a Facebook representative said in a statement.
A Facebook page run by the Myanmar junta's "True News" information service was kicked off the platform Sunday after the tech giant accused it of inciting violence.
Security forces in the country have steadily increased violence against a massive and largely peaceful civil disobedience campaign demanding the return of deposed civilian leader Aung San Suu Kyi.
The Nobel laureate was taken into custody along with her top political allies at the start of the month, but the new regime has insisted it took power lawfully.
It has used Facebook to claim Suu Kyi's landslide election victory last November was tainted by voter fraud and issue stark warnings to the protest movement -- which is demanding that the army relinquish power.
A spokesperson for the platform said the Tatmadaw True News Information Team page was removed for "repeated violations of our Community Standards prohibiting incitement of violence and coordinating harm".
https://www.ndtv.com/world-news/myanmar-crisis-facebook-takes-down-main-page-of-myanmar-military-2375164
#fb #DeleteFacebook #myanmar #military #violence
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
"In line with our global policies, we've removed the Tatmadaw True News Information Team Page from Facebook for repeated violations of our Community Standards prohibiting incitement of violence and coordinating harm," a Facebook representative said in a statement.
A Facebook page run by the Myanmar junta's "True News" information service was kicked off the platform Sunday after the tech giant accused it of inciting violence.
Security forces in the country have steadily increased violence against a massive and largely peaceful civil disobedience campaign demanding the return of deposed civilian leader Aung San Suu Kyi.
The Nobel laureate was taken into custody along with her top political allies at the start of the month, but the new regime has insisted it took power lawfully.
It has used Facebook to claim Suu Kyi's landslide election victory last November was tainted by voter fraud and issue stark warnings to the protest movement -- which is demanding that the army relinquish power.
A spokesperson for the platform said the Tatmadaw True News Information Team page was removed for "repeated violations of our Community Standards prohibiting incitement of violence and coordinating harm".
https://www.ndtv.com/world-news/myanmar-crisis-facebook-takes-down-main-page-of-myanmar-military-2375164
#fb #DeleteFacebook #myanmar #military #violence
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
NDTV.com
"Incitement Of Violence": Facebook Takes Down Myanmar Military's Page
Facebook on Sunday deleted the main page of the Myanmar military under it standards prohibiting the incitement of violence, the company said, a day after two protesters were killed when police opened fire at a demonstration against the Feb 1 coup.
Parents alerted to NurseryCam security breach
A webcam system that lets parents drop in and watch their children while at nursery school has written to families to tell them of a data breach.
NurseryCam said it did not believe the incident had involved any youngsters or staff being watched without their permission, but had shut down its server as a precautionary measure.
The Guildford-based company told the BBC its service was used by about 40 nurseries across the UK.
It said it had also notified the ICO.
Under UK rules, the Information Commissioner's Office must be told of a breach if it has "significant impact" within 24 hours.
NurseryCam said it first became aware of the incident shortly after 17:00GMT on Friday.
It added the service would remain suspended until a security fix was in place.
https://www.bbc.com/news/technology-56141093
#security #data #breach #webcam #uk
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
A webcam system that lets parents drop in and watch their children while at nursery school has written to families to tell them of a data breach.
NurseryCam said it did not believe the incident had involved any youngsters or staff being watched without their permission, but had shut down its server as a precautionary measure.
The Guildford-based company told the BBC its service was used by about 40 nurseries across the UK.
It said it had also notified the ICO.
Under UK rules, the Information Commissioner's Office must be told of a breach if it has "significant impact" within 24 hours.
NurseryCam said it first became aware of the incident shortly after 17:00GMT on Friday.
It added the service would remain suspended until a security fix was in place.
https://www.bbc.com/news/technology-56141093
#security #data #breach #webcam #uk
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
BBC News
Parents alerted to NurseryCam security breach
The company says its logins were hacked but it does not believe children or staff were spied on.
Social Analyzer
Social Analyzer - API, CLI & Web App for analyzing & finding a person's profile across +300 social media websites. It includes different string analysis and detection modules, you can choose which combination of modules to use during the investigation process.
The detection modules utilize a rating mechanism based on different detection techniques, which produces a rate value that starts from 0 to 100 (No-Maybe-Yes). This module intended to have less false positive and it's documented in this Wiki link
The analysis and extracted social media information from this OSINT tool could help in investigating profiles related to suspicious or malicious activities such as cyberbullying, cybergrooming, cyberstalking, and spreading misinformation.
This project is "currently used by some law enforcement agencies in countries where resources are limited".
https://github.com/qeeqbox/social-analyzer
#social #analyzer #qeeqbox #socialmedia #tool
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Social Analyzer - API, CLI & Web App for analyzing & finding a person's profile across +300 social media websites. It includes different string analysis and detection modules, you can choose which combination of modules to use during the investigation process.
The detection modules utilize a rating mechanism based on different detection techniques, which produces a rate value that starts from 0 to 100 (No-Maybe-Yes). This module intended to have less false positive and it's documented in this Wiki link
The analysis and extracted social media information from this OSINT tool could help in investigating profiles related to suspicious or malicious activities such as cyberbullying, cybergrooming, cyberstalking, and spreading misinformation.
This project is "currently used by some law enforcement agencies in countries where resources are limited".
https://github.com/qeeqbox/social-analyzer
#social #analyzer #qeeqbox #socialmedia #tool
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
GitHub
GitHub - qeeqbox/social-analyzer: API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites - qeeqbox/social-analyzer
6 | Life Support
Carbonite | Midroll | Spoke Media
Equifax Data Breach: Is Privacy Dead
The final episode of Breach Season 2 features an in-depth conversation with long-time Gartner Security and Privacy analyst Avivah Litan. Litan contends that privacy has been dead since the early β00s and the only way to restore it is widespread consumer protest. She explains how our personal information is compiled into massive data warehouses, who uses it, and for what purposes.
Breach podcast - S2 Episode 6
https://www.carbonite.com/podcasts/breach/s02e06-equifax-data-breach
#breach #podcast #equifax #privacy
π@cRyPtHoN_INFOSEC_FR
π@cRyPtHoN_INFOSEC_EN
π@cRyPtHoN_INFOSEC_DE
π@BlackBox_Archiv
π@NoGoolag
The final episode of Breach Season 2 features an in-depth conversation with long-time Gartner Security and Privacy analyst Avivah Litan. Litan contends that privacy has been dead since the early β00s and the only way to restore it is widespread consumer protest. She explains how our personal information is compiled into massive data warehouses, who uses it, and for what purposes.
Breach podcast - S2 Episode 6
https://www.carbonite.com/podcasts/breach/s02e06-equifax-data-breach
#breach #podcast #equifax #privacy
π@cRyPtHoN_INFOSEC_FR
π@cRyPtHoN_INFOSEC_EN
π@cRyPtHoN_INFOSEC_DE
π@BlackBox_Archiv
π@NoGoolag
Kim Dotcom, United States & NZ Supreme Court All Agree to Court of Appeal Referral
Following a rare moment of agreement, requests from Kim Dotcom and the United States government to refer the extradition case back to the Court of Appeal have been approved by the Supreme Court. The decision marks a split among the Megaupload defendants, after a request from Mathias Ortmann, Finn Batato, and Bram van der Kolk to have the matter heard by a faster route was denied.
Ever since the Megaupload raids in 2012, the US Government has been trying to extradite Megaupload founder Kim Dotcom and former colleagues Mathias Ortmann, Bram van der Kolk, and Finn Batato to face a laundry list of offenses underpinned by allegations of mass copyright infringement.
Under New Zealandβs Extradition Act 1999, the US needed to show that the alleged crimes would result in a trial in New Zealand if those offenses had been committed there β i.e they are offenses in both countries. Several lower courts in New Zealand found that to be the case but the matter ultimately ended up at the Supreme Court.
https://torrentfreak.com/kim-dotcom-united-states-nz-supreme-court-all-agree-to-court-of-appeal-referral-210222/
#kim #dotcom #usa #nzl
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Following a rare moment of agreement, requests from Kim Dotcom and the United States government to refer the extradition case back to the Court of Appeal have been approved by the Supreme Court. The decision marks a split among the Megaupload defendants, after a request from Mathias Ortmann, Finn Batato, and Bram van der Kolk to have the matter heard by a faster route was denied.
Ever since the Megaupload raids in 2012, the US Government has been trying to extradite Megaupload founder Kim Dotcom and former colleagues Mathias Ortmann, Bram van der Kolk, and Finn Batato to face a laundry list of offenses underpinned by allegations of mass copyright infringement.
Under New Zealandβs Extradition Act 1999, the US needed to show that the alleged crimes would result in a trial in New Zealand if those offenses had been committed there β i.e they are offenses in both countries. Several lower courts in New Zealand found that to be the case but the matter ultimately ended up at the Supreme Court.
https://torrentfreak.com/kim-dotcom-united-states-nz-supreme-court-all-agree-to-court-of-appeal-referral-210222/
#kim #dotcom #usa #nzl
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Torrentfreak
Kim Dotcom, United States & NZ Supreme Court All Agree to Court of Appeal Referral * TorrentFreak
The Supreme Court in New Zealand has agreed to send Kim Dotcom's case back to the Court of Appeal for review, something the US also requested.
Media is too big
VIEW IN TELEGRAM
Lifting the Fog on Red Star OS
A deep dive into the surveillance features of North Korea's operating system
Angae means "Fog" in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea's operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works.
https://media.ccc.de/v/32c3-7174-lifting_the_fog_on_red_star_os
#RedStarOS #northkorea #ccc #32c3 #video
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
A deep dive into the surveillance features of North Korea's operating system
Angae means "Fog" in Korean. The term is widely used in parts of custom code used by the Red Star OS. We will lift the fog on the internals of North Korea's operating system. Our talk will provide information about how privacy is invaded for all users of Red Star OS and how an operating system designed by a totalitarian dictatorship works.
https://media.ccc.de/v/32c3-7174-lifting_the_fog_on_red_star_os
#RedStarOS #northkorea #ccc #32c3 #video
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Whistleblowers: Software Bug Keeping Hundreds Of Inmates In Arizona Prisons Beyond Release Dates
According to Arizona Department of Corrections whistleblowers, hundreds of incarcerated people who should be eligible for release are being held in prison because the inmate management software cannot interpret current sentencing laws.
KJZZ is not naming the whistleblowers because they fear retaliation. The employees said they have been raising the issue internally for more than a year, but prison administrators have not acted to fix the software bug. The sources said Chief Information Officer Holly Greene and Deputy Director Joe Profiri have been aware of the problem since 2019.
The Arizona Department of Corrections confirmed there is a problem with the software.
As of 2019, the department had spent more than $24 million contracting with IT company Business & Decision, North America to build and maintain the software program, known as ACIS, that is used to manage the inmate population in state prisons.
One of the software modules within ACIS, designed to calculate release dates for inmates, is presently unable to account for an amendment to state law that was passed in 2019.
https://kjzz.org/content/1660988/whistleblowers-software-bug-keeping-hundreds-inmates-arizona-prisons-beyond-release
#whistleblowers #usa #software #bug #prisons #inmates #arizona
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
According to Arizona Department of Corrections whistleblowers, hundreds of incarcerated people who should be eligible for release are being held in prison because the inmate management software cannot interpret current sentencing laws.
KJZZ is not naming the whistleblowers because they fear retaliation. The employees said they have been raising the issue internally for more than a year, but prison administrators have not acted to fix the software bug. The sources said Chief Information Officer Holly Greene and Deputy Director Joe Profiri have been aware of the problem since 2019.
The Arizona Department of Corrections confirmed there is a problem with the software.
As of 2019, the department had spent more than $24 million contracting with IT company Business & Decision, North America to build and maintain the software program, known as ACIS, that is used to manage the inmate population in state prisons.
One of the software modules within ACIS, designed to calculate release dates for inmates, is presently unable to account for an amendment to state law that was passed in 2019.
https://kjzz.org/content/1660988/whistleblowers-software-bug-keeping-hundreds-inmates-arizona-prisons-beyond-release
#whistleblowers #usa #software #bug #prisons #inmates #arizona
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
KJZZ
Whistleblowers: Software bug keeping hundreds of inmates in Arizona prisons beyond release dates
According to Arizona Department of Corrections whistleblowers, hundreds of incarcerated people who should be eligible for release are being held in prison because the inmate management software cannot interpret current sentencing laws.β More Arizona Prisonβ¦
Media is too big
VIEW IN TELEGRAM
Tracking Russian Hackers
In this parallel reality, where spies, paranoid and discreet geeks compete for territory, the film tells an invisible war, where viruses are terrifying weapons and information a key issue. A war that can destabilize our world, touch all of us and where Russia advances its pawns with determination. Russian hackers have been on the front page of Western media. In the United States, they are accused of interfering in the 2016 presidential campaign by hacking emails from the American Democratic Party. In Kiev, Ukraine, cyberattacks wreak havok. The culprits are designated: Russia and its mercenaries, hackers. But who are they really?
https://www.youtube.com/watch?v=23WU6XOFpGA
#russian #hackers #video
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
In this parallel reality, where spies, paranoid and discreet geeks compete for territory, the film tells an invisible war, where viruses are terrifying weapons and information a key issue. A war that can destabilize our world, touch all of us and where Russia advances its pawns with determination. Russian hackers have been on the front page of Western media. In the United States, they are accused of interfering in the 2016 presidential campaign by hacking emails from the American Democratic Party. In Kiev, Ukraine, cyberattacks wreak havok. The culprits are designated: Russia and its mercenaries, hackers. But who are they really?
https://www.youtube.com/watch?v=23WU6XOFpGA
#russian #hackers #video
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Media is too big
VIEW IN TELEGRAM
Confessions of a Hacker known as Kingpin - Joe Grand Story
Explore Joe Grandβs life journey as a hardware hacker. Known as Kingpin, his curiosity has been manipulating electronic devices since the 1980s. Learn more about his hacker lifestyle and get a glimpse inside Joeβs mind as he explains how hacking, technology and engineering fuels his passion.
https://www.youtube.com/watch?v=5bcbmef4I3I
#kingpin #hackers #hacking #video
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Explore Joe Grandβs life journey as a hardware hacker. Known as Kingpin, his curiosity has been manipulating electronic devices since the 1980s. Learn more about his hacker lifestyle and get a glimpse inside Joeβs mind as he explains how hacking, technology and engineering fuels his passion.
https://www.youtube.com/watch?v=5bcbmef4I3I
#kingpin #hackers #hacking #video
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
The Story of Jian β How APT31 Stole and Used an Unknown Equation Group 0-Day
There is a theory which states that if anyone will ever manage to steal and use nation-grade cyber tools, any network would become untrusted, and the world would become a very dangerous place to live in.
There is another theory which states that this has already happened.
What would you say if we told you that a foreign group managed to steal an American nuclear submarine? That would definitely be a bad thing, and would quickly reach every headline.
However, for cyber weapons β although their impact could be just as devastating β it`s usually a different story.
Cyber weapons are digital and volatile by nature. Stealing them and transferring from one continent to another, can be as simple as sending an email. They are also very obscure, and their mere existence is a closely guarded secret. That is exactly why, as opposed to a nuclear submarine, stealing a cyber-weapon can easily go under the radar and become a fact known only to a selected few.
The implications of such a scenario can be devastating, as the world have already experienced with the case of the Shadow Brokers leak, in which a mysterious group have decided to publicly publish a wide range of cyber weapons allegedly developed by the Tailored Access Operations (TAO) unit of the NSA β also referred to as the βEquation Groupβ.
The Shadow Brokers leak lead to some of the biggest cyber outbreaks in history β the most famous of which was the WannaCry attack causing hundreds of millions of dollars in damages to organizations across the globe β and which its implications are still relevant even 3 years after it happened.
The Shadow brokers leak however, just gave us a taste of some of the possible implications such a cyber-theft can cause. Many important questions still remain β could this have also happened before? And if so, who is behind it and what did they use it for?
Our recent research aims to shed more light on this topic, and reveal conclusive evidence that such a leak did actually take place years before the Shadow Brokers leak, resulting in US developed cyber tools reaching the hands of a Chinese group which repurposed them in order to attack US targets.
https://research.checkpoint.com/2021/the-story-of-jian/
#research #jian #apt31 #shadowbrokers #leak
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
There is a theory which states that if anyone will ever manage to steal and use nation-grade cyber tools, any network would become untrusted, and the world would become a very dangerous place to live in.
There is another theory which states that this has already happened.
What would you say if we told you that a foreign group managed to steal an American nuclear submarine? That would definitely be a bad thing, and would quickly reach every headline.
However, for cyber weapons β although their impact could be just as devastating β it`s usually a different story.
Cyber weapons are digital and volatile by nature. Stealing them and transferring from one continent to another, can be as simple as sending an email. They are also very obscure, and their mere existence is a closely guarded secret. That is exactly why, as opposed to a nuclear submarine, stealing a cyber-weapon can easily go under the radar and become a fact known only to a selected few.
The implications of such a scenario can be devastating, as the world have already experienced with the case of the Shadow Brokers leak, in which a mysterious group have decided to publicly publish a wide range of cyber weapons allegedly developed by the Tailored Access Operations (TAO) unit of the NSA β also referred to as the βEquation Groupβ.
The Shadow Brokers leak lead to some of the biggest cyber outbreaks in history β the most famous of which was the WannaCry attack causing hundreds of millions of dollars in damages to organizations across the globe β and which its implications are still relevant even 3 years after it happened.
The Shadow brokers leak however, just gave us a taste of some of the possible implications such a cyber-theft can cause. Many important questions still remain β could this have also happened before? And if so, who is behind it and what did they use it for?
Our recent research aims to shed more light on this topic, and reveal conclusive evidence that such a leak did actually take place years before the Shadow Brokers leak, resulting in US developed cyber tools reaching the hands of a Chinese group which repurposed them in order to attack US targets.
https://research.checkpoint.com/2021/the-story-of-jian/
#research #jian #apt31 #shadowbrokers #leak
π‘@cRyPtHoN_INFOSEC_FR
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@BlackBox_Archiv
π‘@NoGoolag
Check Point Research
The Story of Jian - How APT31 Stole and Used an Unknown Equation Group 0-Day - Check Point Research
Research by: Eyal Itkin and Itay Cohen There is a theory which states that if anyone will ever manage to steal and use nation-grade cyber tools, any network would become untrusted, and the world would become a very dangerous place to live in. There is anotherβ¦