Remove 2010 Remove Surveillance Remove Technology
article thumbnail

On Chinese "Spy Trains"

Schneier on Security

Meanwhile, the chairman of China's technology giant Huawei has pointed to NSA spying disclosed by Edward Snowden as a reason to mistrust US technology companies. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance.

article thumbnail

Cisco to pay $8.6 million fine for selling flawed surveillance technology to the US Gov

Security Affairs

Back in 2008, a whistle-blower identifies a vulnerability in Cisco video surveillance software, but the tech giant continued to sell the software to US agencies until July 2013. Cisco finally addressed the flaws in 2013 and stopped selling Cisco Video Surveillance Manager (VSM) in 2014. Cisco is going to pay $8.6 Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US pharmacy Rite Aid banned from operating facial recognition systems

Malwarebytes

The regulator found so many flaws in the retailer’s surveillance program that it concluded Rite Aid had failed to implement reasonable procedures and prevent harm to consumers in its use of facial recognition technology in hundreds of stores. It failed to monitor or test the accuracy of the technology after deployment.

article thumbnail

China using AI to develop robots that can hide in sea launch bombs and cyber attacks

CyberSecurity Insiders

China is once again in the news for misusing the technology of Artificial Intelligence. Privacy advocates across the world say that such mass surveillance programs do more bad than good as they make the populace get a feeling that their government never trusts them.

article thumbnail

Evaluating the GCHQ Exceptional Access Proposal

Schneier on Security

In 2010, China successfully hacked the back-door mechanism Google put in place to meet law-enforcement requests. They reduce our reliance on security technologies we know how to do well -- cryptography -- to computer security technologies we are much less good at. Again, this is nothing new.

article thumbnail

Defeating Little Brother requires a new outlook on privacy: Lock and Code S04E23

Malwarebytes

But the type of surveillance we’re talking about today is different. Little Brother isn’t just surveillance. It is increasingly popular, normalized, and accessible surveillance. “My question to you is, as with all forms of technology, there are two very different sides for this. So, what can stop it?

article thumbnail

Law enforcement agencies can extract data from thousands of cars’ infotainment systems

Security Affairs

Law enforcement and intelligence worldwide are buying technologies that exploit weaknesses in vehicle systems. According to a report published by Forbes, federal law enforcement agencies, with immigration and border cops are using technologies that can exploit similar weaknesses to extract data from 10,000 different car models.