John Lister

Thu
30
Mar
John Lister's picture

Congress: Internet Firms Can Share (Sell) Your User Activity

Congress has voted to ditch rules that would have made it harder for broadband companies to share personal user data with third party companies. The vote means Federal Communications Commission (FCC) regulations will not take effect. The rules were ... adopted by the FCC last October and covered broadband and wireless providers, but not websites such as Google or Facebook. Had they taken effect, the rules would have meant Internet providers could not share key data - for example with advertisers - without the explicit consent of customers. This data included browsing history, details of the apps ... (view more)

Wed
29
Mar
John Lister's picture

Docs.com Users Warned to Check Sharing Settings

Users of Microsoft's Docs.com have been warned to review security settings on their account. Researchers found it was all too easy to search and find personal data contained in documents mistakenly made public. Docs.com is designed to make it easy ... to share documents with other users over the Internet, including PDF files and those in Office formats, regardless of the device and operating system they are using. The site includes a search feature that lets a user look for text in any document on the service to which they have access - something that's designed to make it much easier ... (view more)

Tue
28
Mar
John Lister's picture

Amazon's High-Tech, Cashier-less Grocery Store Delayed

Amazon's plans for convenience stores without checkouts or cashiers have taken a knock. Initial test show the system doesn't work properly if more than 20 or so customers use the store at once. The Amazon Go store works through a dedicated ... smartphone app and a technology similar to that used in hotel minibars. When a customer picks up an item from the shelf it will automatically be added to their virtual shopping cart (as well as their real one), though if they put it back on the shelf it will be removed. Instead of paying for the items at the check out, the customer simply walks out ... (view more)

Thu
23
Mar
John Lister's picture

Email Scammer Takes $100 Million

A man has been arrested after allegedly scamming two US companies into sending him more than a hundred million dollars online. He posed as a legitimate computer manufacturer and issued bogus requests for payment. The companies haven't been named, ... but prosecutors say one is a "multinational technology company" and the other a "multinational online social media company." Evaldas Rimasauskus was arrested in Lithuania last week and has been charged in US courts with one count of wire fraud, one count of aggravated identify theft, and three counts of money laundering. Bogus ... (view more)

Wed
22
Mar
John Lister's picture

Man Jailed Over a Year for Not Disclosing Password

A US court says a man must provide the password to unlock two hard drives that prosecutors say contain unlawful images. The court rejected his appeal that to do so would breach his fifth amendment rights, which roughly translate to: "No person shall ... be held to answer for a ... [crime], unless on a presentment or indictment of a grand jury." The case is an unusual twist on the more common disputes about how the fourth amendment -- which deals with searches and seizures -- applies to technology. In this case the man claims that handing over the password could incriminate him. The ... (view more)

Tue
21
Mar
John Lister's picture

Advertisers Ditch Google Over Extremist YouTube Videos

Google has apologized to businesses whose ads appeared next to extremist videos on YouTube. It follows several major brands and the British government dropping Google advertising over the affair. The Times newspaper reported that videos from ... extremist groups had appeared beside advertising from many a host of big businesses and government agencies. That not only meant embarrassment but could mean that the advertisers were unwittingly -- if indirectly -- contributing to extremist groups. Content Classification Confusing Google's Matt Brittin told a conference that he wanted to " ... (view more)

Thu
16
Mar
John Lister's picture

Twitter, Facebook Users: Review Account Settings

A major "hack" of prominent Twitter accounts has raised awareness of a big security loophole. The problem isn't with Twitter itself, but rather third party tools. This morning several thousand accounts belonging to public figures and major ... organizations and businesses posted identical messages. The tweets included a swastika symbol and references to Nazi views in Germany and the Netherlands and are thought to relate to an ongoing political spat between the Netherlands and Turkey. (Source: bostonglobe.com ) There's never a good time for accounts to be hijacked in such a way, ... (view more)

Wed
15
Mar
John Lister's picture

Adult Toy Tracked User Activity, Prompts Lawsuit

The makers of a remote controlled device for personal pleasure have agreed to pay $3.75 million after allegedly collecting data on how the device was used. Standard Innovations has not formally admitted any wrongdoing. The company makes several ... models in the We-Vibe line, each designed for intimate female use. Some of them include a Bluetooth connection that in turn connects to a smartphone. That allows the user or a partner to remotely control the operation and settings of the device, with an option for partners in long-distance relationships to operate the device over the Internet. ... (view more)

Tue
14
Mar
John Lister's picture

Malware Preinstalled on Many Android Phones

Android phones from a variety of companies have reached business employees with malware already installed according to researchers. How and why it got there is not yet confirmed. The report comes from Checkpoint, a security company. It says it was ... examining devices used by staff at two businesses: one a "large telecommunications company" and the other a "multinational technology company." (Source: checkpoint.com ) While it's not unusual to find malware on employee phones during some checks -- that's partly the purpose of hiring services such as Checkpoint. ... (view more)

Thu
09
Mar
John Lister's picture

Report: CIA Hacking Smart TVs, Listening In

Leaked documents suggest the CIA has a program for spying on people through home devices such as Smart TVs. However, it appears such attacks are highly targeted and often require physical access to the TVs. The claims come through a batch of 8,761 ... documents released by WikiLeaks, which says they come from the CIA. That agency has yet to comment on their authenticity and have not yet been independently verified. The documents are said to detail some of the tactics the CIA have used to improve digital surveillance. The overall message is that the agency appears to be concentrating more on ... (view more)

Pages

Subscribe to RSS - John Lister