A bug in cell phone tracking firm’s website leaked millions of Americans’ real-time locations | ZDNet

https://www.zdnet.com/article/cell-phone-tracking-firm-exposed-millions-of-americans-real-time-locations/ Another week and another privacy disaster. Now a company that collects the real-time location data on millions of cell phone customers across North America had a bug in its website that may have exposed nearly every cell phone customer in the US and Canada, some 200 million customers. The LocationSmart page required explicit consent

It’s Not Just Facebook That Knows A Horrifying Amount Of Stuff About You | IFLScience

http://www.iflscience.com/technology/its-not-just-facebook-that-knows-a-horrifying-amount-of-stuff-about-you/ It’s Not Just Facebook That Knows A Horrifying Amount Of Stuff About You. Following the recent Cambridge Analytica scandal, many people are expressing concern about Facebook and how much it knows about them. “If the product is free, you are the product. If they’re making money, they probably have a lot of your data

Permissionless data slurping: Why Google’s latest bombshell matters • The Register

https://www.theregister.co.uk/2017/11/22/permissionless_data_slurping_google/ Somebody else than just your mobile operator gets to know where you are: According to an old Chinese proverb: “When a wise man points at the Moon, an idiot looks at his finger.” Google may have been hoping that you were examining a finger, not reading a Quartz story yesterday, which reveals how Android phones send

No, you’re not being paranoid. Sites really are watching your every move | Ars Technica

https://arstechnica.com/tech-policy/2017/11/an-alarming-number-of-sites-employ-privacy-invading-session-replay-scripts/ If you have the uncomfortable sense someone is looking over your shoulder as you surf the Web, you’re not being paranoid. A new study finds hundreds of sites—including microsoft.com, adobe.com, and godaddy.com—employ scripts that record visitors’ keystrokes, mouse movements, and scrolling behavior in real time…

Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs

http://thehackernews.com/2017/07/ssh-credential-hacking.html?m=1 WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell) credentials from targeted Windows and Linux operating systems. BothanSpy implant is for Microsoft Windows Xshell client. Gyrfalcon targets the OpenSSH client on various distributions of Linux OS: CentOS,

OutlawCountry: CIA’s Hacking Tool For Linux Computers Revealed

https://fossbytes.com/outlawcountry-cia-hacking-tool-linux/ Wikileaks has published fresh documents that deal with the CIA’s hacking and spying on Linux machines using a malware strain called OutlawCountry. This tool consists of a kernel module that creates invisible netfilter table for creating new rules with iptables command. Those rules can modify and redirect the network traffic. The OutlawCountry’s prerequisites for operation are

Researchers train drones to use Wi-Fi to look through walls | TechCrunch

https://techcrunch.com/2017/06/19/researchers-train-drones-to-use-wi-fi-to-look-through-walls/?ncid=rss&utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=FaceBook&sr_share=facebook This is quite interesting -or frightening – WiFi radar application. A new system by University of California, Santa Barbara researchers Yasamin Mostofi and Chitra R. Karanam uses two drones, a massive Wi-Fi antenna, and a little interpolation to literally see through solid walls. One drone blasts Wi-Fi through the structure and another picks up the signal.

Who catches the IMSI catchers? Researchers demonstrate Stingray detection kit

https://techcrunch.com/2017/06/02/who-catches-the-imsi-catchers-researchers-demonstrate-stingray-detection-kit/?ncid=rss&utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=FaceBook&sr_share=facebook What’s needed is an independent method of identifying IMSI catchers in the wild. That’s what University of Washington researchers Peter Ney and Ian Smith have attempted to create with SeaGlass. “Up until now the use of IMSI-catchers around the world has been shrouded in mystery, and this lack of concrete information is a barrier to