Remove feature-stories
article thumbnail

Automakers Are Sharing Driver Data with Insurers without Consent

Schneier on Security

Kasmir Hill has the story : Modern cars are internet-enabled, allowing access to services like navigation, roadside assistance and car apps that drivers can connect to their vehicles to locate them or unlock them remotely. In recent years, automakers, including G.M., In recent years, automakers, including G.M.,

Insurance 303
article thumbnail

From Feature to Vulnerability: a spring-security-oauth2-client Story

Security Boulevard

The post From Feature to Vulnerability: a spring-security-oauth2-client Story appeared first on Security Boulevard. Today we focus on the “oauth2” client, which provides an application with the capability to have users log in using their existing account at an OAuth 2.0 Provider, i.e Github and Google, among others.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When Apps Go Rogue

Schneier on Security

Interesting story of an Apple Macintosh app that went rogue. With more official macOS features added in 2021 that enabled the “Night Shift” dark mode, the NightOwl app was left forlorn and forgotten on many older Macs. This is not an unusual story. Sometimes the apps are sold.

267
267
article thumbnail

NJ Man Hired Online to Firebomb, Shoot at Homes Gets 13 Years in Prison

Krebs on Security

4, 2022 story here about the emergence of “violence-as-a-service” offerings, where random people from the Internet hire themselves out to perform a variety of local, physical attacks, including firebombing a home, “bricking” windows, slashing tires, or performing a drive-by shooting at someone’s residence.

Internet 241
article thumbnail

Smashing Security podcast #364: Bing pop-up wars, and the British Library ransomware scandal

Graham Cluley

enthusiastically encourages Chrome users to stop using Google, and silence hits the British Library as it shares its story of a ransomware attack. Plus: Don't miss our featured interview with Kolide founder Jason Meller about his firm's acquisition by 1Password.

article thumbnail

Surveillance through Push Notifications

Schneier on Security

But we all know how the story goes: “This is how any new surveillance method starts out: The government says we’re only going to use this in the most extreme cases, to stop terrorists and child predators, and everyone can get behind that,” said Cooper Quintin, a technologist at the advocacy group Electronic Frontier Foundation.

article thumbnail

Apple Adds a Backdoor to iMesssage and iCloud Storage

Schneier on Security

Here are five news stories.) EFF writes : There are two main features that the company is planning to install in every Apple device. This feature can be turned on or off by parents. This doesn’t change the privacy assurances of Messages, and Apple never gains access to communications as a result of this feature.