article thumbnail

Sickness Monitoring is the Opening Video Surveillance Has Been Waiting For

Daniel Miessler

The Real Internet of Things, January 2017. Just yesterday I tweeted that the COVID-19 situation was going to finally make large-scale video surveillance endemic to our society. New: AI/surveillance company claims it's deploying 'coronavirus-detecting' cameras in the United States.

article thumbnail

Are the Police using Smart-Home IoT Devices to Spy on People?

Schneier on Security

IoT devices are surveillance devices, and manufacturers generally use them to collect data on their customers. Surveillance is still the business model of the Internet, and this data is used against the customers' interests: either by the device manufacturer or by some third-party the manufacturer sells the data to.

IoT 237
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

After a good start, the Internet-enabled, technological revolution we are living through has hit some bumps in the road. To celebrate Independence Day we want to draw your attention to five technologies that could improve life, liberty and the pursuit of happiness on the Internet. And yet almost every Internet account requires one.

Internet 116
article thumbnail

Who’s Hacking You?

Webroot

For even more tips from Webroot IT security experts Tyler Moffitt, Kelvin Murray, Grayson Milbourne, George Anderson and Jonathan Barnett, download the complete e-book on hacker personas. Once the criminal redirects internet traffic to malicious websites or takes control of servers, the damage is inevitable. The Impersonator.

Hacking 116
article thumbnail

Interview: Joseph Steinberg, CyberSecurity Expert and Author

Joseph Steinberg

Utopia seeks to help transform our society into one in which everyone can feel free from censorship, surveillance, and data leakage — and does so by increasingly helping people to reliably answer the question “How can I to protect myself and my data in the global information space?” The one person handling Internet security.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. Could agents take control of my computer over the Internet if they wanted to? Many have written about how being under constant surveillance changes a person. Very probably. Definitely.

article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

Harvard Business School professor Shoshana Zuboff calls it " surveillance capitalism." Surveillance capitalism takes this one step further. Google's surveillance isn't in the news, but it's startlingly intimate. That phone is probably the most intimate surveillance device ever invented. In 2015, I wrote a book about it.