Helping survivors of domestic abuse: What to do when you find stalkerware

Credit to Author: David Ruiz| Date: Mon, 01 Jul 2019 16:51:59 +0000

Starting today, we’re doing more to protect stalkerware victims than improve our detection capabilities. We’re helping survivors understand how to tell if they’re being watched on their devices—and how to safely get out of the situation.

Categories:

Tags:

(Read more…)

The post Helping survivors of domestic abuse: What to do when you find stalkerware appeared first on Malwarebytes Labs.

Read more

Google’s Nest fiasco harms user trust and invades their privacy

Credit to Author: davidruiz| Date: Wed, 13 Mar 2019 16:30:29 +0000

Last month, Google announced that its Nest Secure would be updated to work with Google Assistant software. The problem? Google never told users its product had a microphone to begin with. Simple oversight or invasion of privacy? We break it down.

Categories:

Tags:

(Read more…)

The post Google’s Nest fiasco harms user trust and invades their privacy appeared first on Malwarebytes Labs.

Read more

Supreme Court: Police Need Warrant for Mobile Location Data

Credit to Author: BrianKrebs| Date: Fri, 22 Jun 2018 20:30:13 +0000

The U.S. Supreme Court today ruled that the government needs to obtain a court-ordered warrant to gather location data on mobile device users. The decision is a major development for privacy rights, but experts say it may have limited bearing on the selling of real-time customer location data by the wireless carriers to third-party companies.

Read more

New EU Privacy Law May Weaken Security

Credit to Author: BrianKrebs| Date: Thu, 15 Feb 2018 17:11:30 +0000

Companies around the globe are scrambling to comply with new European privacy regulations that take effect a little more than three months from now. But many security experts are worried that the changes being ushered in by the rush to adhere to the law may make it more difficult to track down cybercriminals and less likely that organizations will be willing to share data about new online threats. On May 25, 2018, the General Data Protection Regulation (GDPR) takes effect. The law, enacted by the European Parliament, requires technology companies to get affirmative consent for any information they collect on people within the European Union. Organizations that violate the GDPR could face fines of up to four percent of global annual revenues.

Read more

Is it Time to Can the CAN-SPAM Act?

Credit to Author: BrianKrebs| Date: Sun, 02 Jul 2017 16:14:42 +0000

Regulators at the U.S. Federal Trade Commission (FTC) are asking for public comment on the effectiveness of the CAN-SPAM Act, a 14-year-old federal law that seeks to crack down on unsolicited commercial email. Judging from an unscientific survey by this author, the FTC is bound to get an earful.

Read more

Dual-Use Software Criminal Case Not So Novel

Credit to Author: BrianKrebs| Date: Tue, 04 Apr 2017 18:41:33 +0000

“He built a piece of software. That tool was pirated and abused by hackers. Now the feds want him to pay for the computer crooks’ crimes.” The above snippet is the subhead of a story published last month by the Daily Beast titled “FBI Arrests Hacker Who Hacked No One.” The subject of that piece — a 26-year-old American named Taylor Huddleston — faces felony hacking charges connected to two computer programs he authored and sold: An anti-piracy product called Net Seal, and a Remote Administration Tool (RAT) called NanoCore that he says was a benign program designed to help users remotely administer their computers. The author of the Daily Beast story, former black hat hacker and Wired.com editor Kevin Poulsen, argues that Huddelston’s case “raises a novel question: When is a programmer criminally responsible for the actions of his users? Some experts say [the case] could have far reaching implications for developers, particularly those working on new technologies that criminals might adopt in unforeseeable ways.” But a closer look at the government’s side of the story — as well as public postings left behind by the accused and his alleged accomplices — paints a more complex and nuanced picture that suggests this may not be the case to raise that legal question in a meaningful way.

Read more

Post-FCC Privacy Rules, Should You VPN?

Credit to Author: BrianKrebs| Date: Thu, 30 Mar 2017 21:33:48 +0000

Many readers are understandably concerned about recent moves by the U.S. Congress that would roll back privacy rules barring broadband Internet service providers (ISPs) from sharing or selling customer browsing history, among other personal data. Some are concerned enough by this development that they’re looking at obfuscating all of their online browsing by paying for a subscription to a virtual private networking (VPN) service. This piece is intended to serve as a guidepost for those contemplating such a move.

Read more

House Passes Long-Sought Email Privacy Bill


The U.S. House of Representatives on Monday approved a bill that would update the nation’s email surveillance laws so that federal investigators are required to obtain a court-ordered warrant for access to older stored emails. Under the current law, U.S. authorities can legally obtain stored emails older than 180 days using only a subpoena issued by a prosecutor or FBI agent without the approval of a judge.

Read more