Menu

Blog

Archive for the ‘surveillance’ category: Page 24

Aug 12, 2019

Pre-installed apps in 7 million Android devices found containing malware

Posted by in categories: cybercrime/malcode, mobile phones, surveillance

Security researchers from Google’s Project Zero team recently uncovered pre-installed apps in Android devices that either allowed remote attackers to carry out remote code execution, could disable Google Play Protect in devices, or could collect information on users’ web activities.

At the Black Hat cybersecurity conference in Las Vegas, Maddie Stone, a security researcher on Project Zero and who previously served as Senior Reverse Engineer & Tech Lead on Android Security team, revealed that her team discovered three instances of Android malware being pre-installed in budget Android phones in the recent past.

One such pre-installed app was capable of turning off Google Play Protect, the default mobile security app in Android devices, thereby leaving devices vulnerable to all forms of cyber attacks or remote surveillance. The Project Zero team also found an app pre-installed on Android phones that gathered logs of users’ web activities.

Aug 5, 2019

A Multimillionaire Surveillance Dealer Steps Out Of The Shadows… And His $9 Million WhatsApp Hacking Van

Posted by in categories: cybercrime/malcode, mobile phones, surveillance

He can hack your WhatsApp, find out where you are in 15 minutes and monitor your iPhone. But Tal Dilian says he’s one of the good guys. It’s badly-behaved governments who should be in trouble, not the $12 billion industry he’s come to represent.

Aug 4, 2019

The U.S. Spy Hub in the Heart of Australia

Posted by in categories: security, surveillance

A short drive south of Alice Springs, the second largest population center in Australia’s Northern Territory, there is a high-security compound, code-named “RAINFALL.” The remote base, in the heart of the country’s barren outback, is one of the most important covert surveillance sites in the eastern hemisphere.

Aug 3, 2019

How to Hack a Face: From Facial Recognition to Facial Recreation

Posted by in categories: cybercrime/malcode, information science, mobile phones, privacy, robotics/AI, surveillance

Given that going viral on the Internet is often cyclical, it should come as no surprise that an app that made its debut in 2017 has once again surged in popularity. FaceApp applies various transformations to the image of any face, but the option that ages facial features has been especially popular. However, the fun has been accompanied by controversy; since biometric systems are replacing access passwords, is it wise to freely offer up our image and our personal data? The truth is that today the face is ceasing to be as non-transferable as it used to be, and in just a few years it could be more hackable than the password of a lifetime.

Our countenance is the most recognisable key to social relationships. We might have doubts when hearing a voice on the phone, but never when looking at the face of a familiar person. In the 1960s, a handful of pioneering researchers began training computers to recognise human faces, although it was not until the 1990s that this technology really began to take off. Facial recognition algorithms have improved to such an extent that since 1993 their error rate has been halved every two years. When it comes to recognising unfamiliar faces in laboratory experiments, today’s systems outperform human capabilities.

Continue reading “How to Hack a Face: From Facial Recognition to Facial Recreation” »

Aug 2, 2019

Mass Surveillance: 1 in 2 Americans Are Already In A Government Facial Recognition Database

Posted by in categories: government, robotics/AI, surveillance, transportation

As well as Gait Recognition. (Go ahead and wear a disguise.)


The mass surveillance of innocent Americans continues as George Orwell’s 1984 becomes more of a reality with each passing day. “All told, we are barreling toward a future where every ritual of public life carries implicit consent to be surveilled,” writes Sidney Fussell for The Atlantic.

A new report from Georgetown Law‘s Center on Privacy & Technology (CPT) suggests that Immigration and Customs Enforcement (ICE) may be using the rampant problem of illegal immigration as a type of cover to track and spy on Americans in violation of their Fourth Amendment rights. Three years ago, the center revealed that nearly half of all U.S. adults are already in the FBI’s facial recognition database, which is largely sourced from DMV photos.

Continue reading “Mass Surveillance: 1 in 2 Americans Are Already In A Government Facial Recognition Database” »

Jul 30, 2019

Electronic Harassment Must Stop‼️ Photo

Posted by in categories: mobile phones, surveillance

Do you know how to jam these?


Description:

The StingRay is an IMSI-catcher, a controversial cellular phone surveillance device, manufactured by Harris Corporation.

Jul 28, 2019

The French Have Plans For A Constellation Of Laser-Armed Miniature Satellites

Posted by in categories: satellites, surveillance

France’s “Mastering Space” plan calls for an active defense against hostile satellites and new space-based surveillance capabilities to spot threats.

Jul 24, 2019

Fujifilm’s first surveillance camera can read a license plate from 1km away

Posted by in categories: electronics, surveillance

With a focal length equivalent to 1000mm.

Jul 21, 2019

How an authoritarian regime will intercept all internet traffic inside its country

Posted by in categories: encryption, government, internet, security, surveillance

How dictators work in the 21st century.


The new president of Kazakhstan is now proving that he will keep the old, oppressive systems alive for the 21st century, using advanced technical tools.

The man in the middle: Beginning last week, Kazakhstan’s government is intercepting all HTTPS traffic inside the country, ZDNet reports. HTTPS is a protocol meant to offer encryption, security, and privacy to users, but now the nation’s internet service providers are forcing all users to install certificates that enable pervasive interception and surveillance.

Continue reading “How an authoritarian regime will intercept all internet traffic inside its country” »

Jul 20, 2019

China: Facing up to hyper-surveillance

Posted by in categories: robotics/AI, surveillance

China is the world leader in facial recognition technology. But is the state using it to violate the human rights of its citizens?

Page 24 of 37First2122232425262728Last