Remove Data collection Remove Encryption Remove Internet Remove Surveillance
article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

Key Findings: MY2022, an app mandated for use by all attendees of the 2022 Olympic Games in Beijing, has a simple but devastating flaw where encryption protecting users’ voice audio and file transfers can be trivially sidestepped. Citizen Lab examined the app and found it riddled with security holes.

article thumbnail

5G Security

Schneier on Security

Since the internet, especially the "internet of things," is expected to rely heavily on 5G infrastructure, potential Chinese infiltration is a serious national security threat. To be sure, there are significant security improvements in 5G over 4G­in encryption, authentication, integrity protection, privacy, and network availability.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

This agent gathers data about the user's actions, such as keystrokes, mouse clicks, application usage, and internet activity. Managers can access this data through a console, reviewing reports, live feeds from employee screens, screenshots, video recordings of desktop activity, and intercepted files or messages.

article thumbnail

Privacy predictions 2022

SecureList

We no longer rely on the Internet just for entertainment or chatting with friends. Governments in many countries push for easier identification of Internet users to fight cybercrime, as well as “traditional” crime coordinated online. Machine learning is sure great, but we are going to hear more about machine unlearning.

article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

The Internet of Things (IoT) is very crowded. billion devices will be connected to the Internet by 2020 2. They all must have unique identifiers and the ability to collect and transfer data over networks to enable monitoring, surveillance, and execution of decisions based on the collected data with little or no human intervention.

IoT 72
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

After Section 702 Reauthorization

Schneier on Security

For over a decade, civil libertarians have been fighting government mass surveillance of innocent Americans over the Internet. On January 18, President Trump signed the renewal of Section 702, domestic mass surveillance became effectively a permanent part of US law. We need to look at US surveillance law more generally.