A proof of concept attack uses malware to turn headphones into microphones that can eavesdrop from across a room.
Snowden Can Be Asked To Testify In Person In Germany NSA Probe
An anonymous reader quotes a report from Ars Technica: Whistleblower Edward Snowden can be asked to give evidence in person by a German committee probing the NSA’s spying activities, the country’s Federal Court of Justice has ruled. Germany’s government has…
Uber Portal Leaked Names, Phone Numbers, Email Addresses, Unique Identifiers
Vulnerabilities in UberCENTRAL, a portal used by businesses to facilitate rides, could have leaked the names, phone numbers, email addresses, and unique IDs.
Every move you make, every click you take, we’ll be watching you
‘Subject, are you still there?’ Jaunty website aims to make clear just how closely our online movements are tracked
Privacy boost for iOS users as Mozilla launches Firefox Focus
Barebones browser available for free in the App Store should also boost performance
Should Domain-Name Registrations Require A Verifiable Real Name?
lpress writes: The Internet was a major source of news — fake and real — during the election campaign. The operators of fake sites, whether motivated by politics or greed, are often anonymous. We avoid voter fraud by requiring verification…
Mobile phone company 3 in “upgrade intercept scam” data breach
Got a cool new phone unexpectedly? If it seems too good to be true, it probably is
iPhone Call History Synced to iCloud Without User Consent, Knowledge
Security experts warn iPhone call history data may be synced to iCloud accounts without user knowledge, making personal phone records an easy target for a determined third-party.
Concern and confusion over privacy and security of AR technology
AR has more to offer business than just Pokémon Go, but consumers need reassuring on privacy
WhatsApp tightens user privacy with encrypted video calls
End-to-end encryption is everywhere – but who is protecting whom?