Remove Accountability Remove Internet Remove Marketing Remove Surveillance
article thumbnail

“Ethnicity recognition” tool listed on surveillance camera app store built by fridge-maker’s video analytics startup

Malwarebytes

The commercial reel advertises just one of the many video analytics tools available for download on an app store monitored by the Internet of Things startup Azena, itself a project from the German kitchen appliance maker Bosch. Such promises on video analysis have flooded the market for years, but their accuracy has always been suspect.

article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

After a good start, the Internet-enabled, technological revolution we are living through has hit some bumps in the road. To celebrate Independence Day we want to draw your attention to five technologies that could improve life, liberty and the pursuit of happiness on the Internet. And yet almost every Internet account requires one.

Internet 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

In the not too distant future, each one of us will need to give pause, on a daily basis, to duly consider how we purchase and use Internet of Things devices and services. Mirai and Reaper are examples of a new generation of IoT botnets comprised of millions of infected home routers and surveillance cams. This is coming. Talk more soon.

Internet 189
article thumbnail

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

The Last Watchdog

recently teamed up and found evidence of an emerging market for stolen and spoofed machine identities. This emerging black market for machine identities is but a mere starting point for cyber criminals who recognize a huge, unguarded exposure when they see one. Hudson : The Government Accountability Office examined the Equifax breach.

Marketing 133
article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

Harvard Business School professor Shoshana Zuboff calls it " surveillance capitalism." Surveillance capitalism takes this one step further. Google's surveillance isn't in the news, but it's startlingly intimate. That phone is probably the most intimate surveillance device ever invented. We never lie to our search engines.

article thumbnail

The Four Keys to Achieving an Optimal Application Experience

CyberSecurity Insiders

By Larry Goldman, Senior Manager of Product Marketing, Progress. Network visibility accounts for the information of everyone who interacts with your servers––from their IP address and protocol to the amount of time they’ve spent on your network. Not every house needs a state-of-the-art surveillance system.

Marketing 135
article thumbnail

Fortinet warns of a spike in attacks against TBK DVR devices

Security Affairs

TBK Vision is a video surveillance company that provides network CCTV devices and other related equipment, including DVRs for the protection of critical infrastructure facilities. The CVE-2018-9995 flaw is due to an error when handling a maliciously crafted HTTP cookie. ” reads the advisory published by Fortinet.