John Lister

Wed
22
Mar
John Lister's picture

Man Jailed Over a Year for Not Disclosing Password

A US court says a man must provide the password to unlock two hard drives that prosecutors say contain unlawful images. The court rejected his appeal that to do so would breach his fifth amendment rights, which roughly translate to: "No person shall ... be held to answer for a ... [crime], unless on a presentment or indictment of a grand jury." The case is an unusual twist on the more common disputes about how the fourth amendment -- which deals with searches and seizures -- applies to technology. In this case the man claims that handing over the password could incriminate him. The ... (view more)

Tue
21
Mar
John Lister's picture

Advertisers Ditch Google Over Extremist YouTube Videos

Google has apologized to businesses whose ads appeared next to extremist videos on YouTube. It follows several major brands and the British government dropping Google advertising over the affair. The Times newspaper reported that videos from ... extremist groups had appeared beside advertising from many a host of big businesses and government agencies. That not only meant embarrassment but could mean that the advertisers were unwittingly -- if indirectly -- contributing to extremist groups. Content Classification Confusing Google's Matt Brittin told a conference that he wanted to " ... (view more)

Thu
16
Mar
John Lister's picture

Twitter, Facebook Users: Review Account Settings

A major "hack" of prominent Twitter accounts has raised awareness of a big security loophole. The problem isn't with Twitter itself, but rather third party tools. This morning several thousand accounts belonging to public figures and major ... organizations and businesses posted identical messages. The tweets included a swastika symbol and references to Nazi views in Germany and the Netherlands and are thought to relate to an ongoing political spat between the Netherlands and Turkey. (Source: bostonglobe.com ) There's never a good time for accounts to be hijacked in such a way, ... (view more)

Wed
15
Mar
John Lister's picture

Adult Toy Tracked User Activity, Prompts Lawsuit

The makers of a remote controlled device for personal pleasure have agreed to pay $3.75 million after allegedly collecting data on how the device was used. Standard Innovations has not formally admitted any wrongdoing. The company makes several ... models in the We-Vibe line, each designed for intimate female use. Some of them include a Bluetooth connection that in turn connects to a smartphone. That allows the user or a partner to remotely control the operation and settings of the device, with an option for partners in long-distance relationships to operate the device over the Internet. ... (view more)

Tue
14
Mar
John Lister's picture

Malware Preinstalled on Many Android Phones

Android phones from a variety of companies have reached business employees with malware already installed according to researchers. How and why it got there is not yet confirmed. The report comes from Checkpoint, a security company. It says it was ... examining devices used by staff at two businesses: one a "large telecommunications company" and the other a "multinational technology company." (Source: checkpoint.com ) While it's not unusual to find malware on employee phones during some checks -- that's partly the purpose of hiring services such as Checkpoint. ... (view more)

Thu
09
Mar
John Lister's picture

Report: CIA Hacking Smart TVs, Listening In

Leaked documents suggest the CIA has a program for spying on people through home devices such as Smart TVs. However, it appears such attacks are highly targeted and often require physical access to the TVs. The claims come through a batch of 8,761 ... documents released by WikiLeaks, which says they come from the CIA. That agency has yet to comment on their authenticity and have not yet been independently verified. The documents are said to detail some of the tactics the CIA have used to improve digital surveillance. The overall message is that the agency appears to be concentrating more on ... (view more)

Wed
08
Mar
John Lister's picture

Facebook Fails to Take Down Images Exploiting Children

A major news organization says Facebook doesn't do enough to remove images that exploit children. The British Broadcasting Corporation (BBC) says the site removed just 18 out of 100 images that it reported as part of an investigation. The test was ... part of a follow-up to a report last year about people using members-only groups on the site to share inappropriate images of children. At the time, Facebook said it was improving its moderation system. To see if that was the case, the BBC used Facebook's formal reporting button to report 100 images that appeared to breach the site's ... (view more)

Tue
07
Mar
John Lister's picture

Google Gadget Claims Obama Planning Coup

Google's voice activated home assistant gadget has told users that former president Barack Obama is planning a coup. It's an unfortunate quirk of the way the company applies its website techniques to the gadget. Google Home - the company's answer to ... the Amazon Echo - is a small speaker that contains a microphone and a WiFi connection. It's designed to help with a host of activities around the house where voice-based information is quicker or more convenient than using a phone, tablet or computer. Examples include being able to ask for a recipe unit conversion while in the ... (view more)

Thu
02
Mar
John Lister's picture

Twitter Rethinks Abusive Comment Policing

Twitter is cracking down on abusive and personal attacks. It's giving users extra controls while introducing automated checks to pick up on potential abuse. The new rules aren't specifically about what people can post in a normal tweet. Instead, ... they cover posts where the writer deliberately includes somebody else's user name, meaning that other person will see the post as part of their notifications. That helps deal with a loophole in the way Twitter works. For the most part, people only see posts from accounts they've chosen to follow, but the notifications tool includes ... (view more)

Wed
01
Mar
John Lister's picture

'Smart' Toy Database Exposes Child Voice Recordings

Voice messages from parents to children through a 'smart' cuddly toy could be compromised. The security risk is a combination of a flaw by the designers and poor security practices by users. The issue involves CloudPets, a range of $40 toys designed ... to help working parents stay in touch with their kids. The parent can leave a voice message via a phone app at any time and it will then be sent over the Internet and Bluetooth and played back through a speaker in the toy. The child can then press the toy's paw to record and send a reply. The problem is that while delivering messages ... (view more)

Pages

Subscribe to RSS - John Lister