article thumbnail

Transacting in Person with Strangers from the Internet

Krebs on Security

But when dealing with strangers from the Internet, there is always a risk that the person you’ve agreed to meet has other intentions. These safe trading places exist because sometimes in-person transactions from the Internet don’t end well for one or more parties involved. Nearly all U.S. Nearly all U.S.

Internet 290
article thumbnail

Parents and teachers believe digital surveillance of kids outweighs risks

Malwarebytes

Schools in the US have been using surveillance software to keep an eye on their students, and such software has grown significantly in popularity since the COVD-19 pandemic closed campuses nationwide. In fact, they worry that such surveillance could backfire. Source: The CDT).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Risks of Government Hacking

Schneier on Security

A new report from the Center of Internet and Society looks at the security risks of allowing government hacking. These risks are real, but I think they're much less than mandating backdoors for everyone. Some of us -- myself included -- have proposed lawful government hacking as an alternative to backdoors.

article thumbnail

CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog

Security Affairs

Five of the issues added by CISA to its catalog are part of the exploits used by surveillance vendors to target mobile devices with their commercial spyware: CVE-2021-30900 – Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability. The exploits were used to install commercial spyware and malicious apps on targets’ devices.

Spyware 79
article thumbnail

Post-Roe Privacy

Schneier on Security

Cynthia Conti-Cook’s incredible article “ Surveilling the Digital Abortion Diary details what we know now about how digital evidence has been used to prosecute women who have been pregnant. That evidence includes search engine history, as in the case of the prosecution of Latice Fisher in Mississippi. As Conti-Cook says, Ms.

article thumbnail

Episode 188: Crowdsourcing Surveillance with Flock Safety

The Security Ledger

In this episode of the Security Ledger Podcast (#188), sponsored* by LastPass, we take a look at the fast-expanding world of crowdsourced surveillance by doing a deep dive on Flock Safety, a start up that sells inexpensive license plate scanners to homeowners and police departments. Flying in Surveillance’s Gray Zone.

article thumbnail

Tor’s (security) role in the future of the Internet, with Alec Muffett

Malwarebytes

The open-source project lets people browse the Internet more anonymously by routing their traffic across different nodes before making a final connection between their device and a desired website. “There are so many security risks up the stack,” Muffett said. Tor has a storied reputation in the world of online privacy.