article thumbnail

China’s Olympics App Is Horribly Insecure

Schneier on Security

While the vendor did not respond to our security disclosure, we find that the app’s security deficits may not only violate Google’s Unwanted Software Policy and Apple’s App Store guidelines but also China’s own laws and national standards pertaining to privacy protection, providing potential avenues for future redress.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5G Security

Schneier on Security

Because the companies that make the equipment are subservient to the Chinese government, they could be forced to include backdoors in the hardware or software to give Beijing remote access. Neither is banning Chinese microchips, software, or programmers. Chinese, Iranians, North Koreans, and Russians have been breaking into U.S.

article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

A User Activity Monitoring (UAM) tool is a software solution designed to track and record the activities and interactions of users on computers or networks for security, compliance, or management purposes. UAM systems operate by installing a software agent on each employee's computer. This is particularly relevant for remote workers.

article thumbnail

Microsoft to Add Dedicated AI Copilot Button on Windows PCs

SecureWorld News

Whether it's seeking assistance with complex tasks, troubleshooting software issues, or getting personalized recommendations, the Copilot button enhances the user experience by placing the power of AI at their fingertips. This audio data could be sensitive and is susceptible to misuse if not adequately protected.

article thumbnail

MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

The Last Watchdog

Law enforcement, for instance, drew criticism for using a controversial facial recognition app — Clearview AI — to surveil citizens turning out to protest the George Floyd murder. However, as the data collected by Internet of Things systems gets deeper and richer , the algorithms running AI should get smarter and more accurate.

article thumbnail

A chink in the armor of China-based hacking group Nickel

Malwarebytes

Microsoft Threat Intelligence Center (MSTIC) observed Nickel perform frequent and scheduled data collection and exfiltration from victim networks. The group’s activity included looking in directories of interest for new files added since the last time it collected data.

Hacking 96