Menu

Blog

Archive for the ‘security’ category: Page 90

Nov 25, 2019

Team saw how an attacker could hijack Android camera for spyfest

Posted by in categories: mobile phones, security

Android camera security threat, disclosed and since addressed, had spy vulnerabilities. These were fixed by Google and Samsung with a patch rolled out for Pixel and Samsung devices The recent headlines surrounding the flaw on Android devices teased a discomforting thought in the latest of numerous discomforting thoughts about security risks in the Android ecosystem.

Imagine your app is recording video and taking photos without your permission.

In short, attackers could hijack your phone camera. Dan Goodin in Ars Technica: This was all about “an app needed no permissions at all to cause the camera to shoot pictures and record video and audio.”

Nov 25, 2019

Mystery blurs dump of over 1 billion people’s personal data

Posted by in category: security

Two security sleuths last month discovered an enormous amount of data that was left exposed on a server. Data found on the server belonged to around 1.2 billion people.

Kartikay Mehrotra wrote about it on Friday for Bloomberg, in a story, along with one from Wired, that was frequently quoted over the weekend. The data was left unprotected on a Google Cloud server.

The FBI were contacted and the server was shut down. Not trivial. Wired referred to the situation as a “jumbo” data leak. Wired said the information was sitting exposed and easily accessible on an unsecured server.

Nov 23, 2019

Google Cloud server left a billion people’s data unsecured

Posted by in category: security

Night Lion Security’s Vinny Troia has discovered an unsecured database containing the personal information of 1.2bn users.

Nov 21, 2019

What Is End-to-End Encryption? Another Bull’s-Eye on Big Tech

Posted by in categories: encryption, law enforcement, security, terrorism

Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apple’s chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.


After years of on-and-off debate over nearly snoop-proof security, the industry is girding for new pressure from law enforcement around the world.

Nov 19, 2019

Google Confirms Android Camera Security Threat: ‘Hundreds Of Millions’ Of Users Affected

Posted by in categories: mobile phones, security

Vulnerabilities in the Google Camera app left hackers able to take photos, and silently record audio and video, even when the phone was locked.

Nov 17, 2019

Current Time

Posted by in categories: existential risks, security

FAQ Timeline Dashboard Multimedia Exhibit A new abnormal: It is still 2 minutes to midnight 2019 Doomsday Clock Statement Science and Security Board Bulletin of the Atomic Scientists Editor, John Mecklin From the President | Full Statement | Board Biographies | About the Bulletin | Clock Timeline PDF version | Print this … Continued.

Nov 10, 2019

At age 17, he built Nigeria’s first locally-made drone and on a mission to build an aircraft

Posted by in categories: drones, security, surveillance

David Opateyibo was 17 years old when he built Nigeria’s first locally-made drone in Lagos.

Opateyibo led a team of Lagos State Polytechnic students to produce the country’s first prototype of a drone, which authorities in Lagos hope to deploy for security surveillance.

Continue reading “At age 17, he built Nigeria’s first locally-made drone and on a mission to build an aircraft” »

Nov 2, 2019

Smaller Is Better: Lightweight Face Detection For Smartphones

Posted by in categories: internet, mobile phones, robotics/AI, security, surveillance

Although mobile devices were not designed to run compute-heavy AI models, in recent years AI-powered features like face detection, eye tracking, and voice recognition have all been added to smartphones. Much of the compute for such services is done on the cloud, but ideally these applications would be light enough to run directly on devices without an Internet connection.

In this spirit of “smaller is better,” Shanghai-based developer “Linzai” (GitHub user name @Linzaer) recently shared a new lightweight model that enables real-time face detection for smartphones. The “Ultra-Light-Fast-Generic-Face-Detector-1MB” is designed for general-purpose face detection applications in low-power computing devices and is applicable to both Android and iOS phones as well as PCs (CPU and GPU). The project has garnered a whopping 3.3k Stars and over 600 forks on GitHub.

Facial recognition technology is widely applied in security monitoring, surveillance, human-computer interaction, entertainment, etc. Detecting human faces in digital images is the first step in facial recognition, and an ideal face detection model can be evaluated by how quickly and accurately it performs.

Nov 1, 2019

New Google Chrome Security Alert: Update Your Browsers As ‘High Severity’ Zero-Day Exploit Confirmed

Posted by in category: security

Google has confirmed that a high severity Chrome browser zero-day exploit exists in the wild — here’s what you need to know.

Oct 31, 2019

Researchers create quantum chip 1,000 times smaller than current setups

Posted by in categories: computing, information science, mobile phones, quantum physics, security

Researchers at Nanyang Technological University, Singapore (NTU Singapore) have developed a quantum communication chip that is 1,000 times smaller than current quantum setups, but offers the same superior security quantum technology is known for.

Most leading security standards used in secure communication methods—from withdrawing cash from the ATM to purchasing goods online on the smartphone—does not leverage quantum technology. The electronic transmission of the personal identification number (PIN) or password can be intercepted, posing a .

Roughly three millimeters in size, the tiny chip uses quantum communication algorithms to provide enhanced security compared to existing standards. It does this by integrating passwords within the information that is being delivered, forming a secure quantum key. After the information is received, it is destroyed along with the key, making it an extremely secure form of communication.

Page 90 of 146First8788899091929394Last