Tech to pick faces out of the crowd can be used for good, but it’s also increasingly pervasive

News in brief: US requires social media handles; Putin points to ‘patriotic’ hackers; Snapchat Spectacles arrive
Your daily round-up of some of the other stories in the news

OneLogin Breach Compromised Customer Data, Ability to Decrypt Encrypted Data
A breach at OneLogin appears to have compromised customer data, including the ability to decrypt encrypted data.

Insecure Backend Databases Blamed for Leaking 43TB of App Data
More than 1,000 mobile apps are leaking personal information via unsecured backend platforms such as MongoDB, MySQL and others.

Crooks hold nude plastic surgery pictures to ransom after break-in
Patients, including some celebrities, of a plastic surgery clinic, have found themselves on the receiving end of ransom demands

Keybase adds end-to-end encryption to messages on the web
Chrome extension means that users can send encrypted messages on services such as Twitter, Facebook and Reddit that have enabled Keybase

Rash Of Phishing Attacks Use HTTPS To Con Victims
Phishing sites are deploying freely available TLS certificates in order to dupe victims into thinking they’re visiting a safe site.

Threatpost News Wrap, May 26, 2017
Mike Mimoso and Chris Brook recap the news of the week, including the EternalRocks worm, the latest on WannaCry, a subtitle hack, and a Twitter flaw.

Campaigners demand halt to Vermont’s use of facial recognition
Despite use of facial recognition being banned under state law, Vermont’s DMV is ‘overstepping’ the legislation, say campaigners

Google debuts a new way to follow your footsteps around the web
New machine-learning tool aims to deliver even more information to Google’s advertisers about your ‘consumer journey’