In other words, Tor:
Solari said Winner’s laptop also contained software that could enable her to access online black-markets and buy items — such as a fake ID or passport — without revealing her identity or location.
Source: Accused NSA leaker wanted to ‘burn the White House down’ | New York Post
They can make the same allegation about encryption. Attempting to protect your medical, financial and educational records is a sign of nefarious intent?
Every journalist in existence, if they are any good at all, has Tor on their computer. So do private industry analysts reviewing competitor’s products and government policy plans. Tor is a browser that assists with anonymous browsing and accessing web sites as it hides one’s true IP address from the destination web server. There are numerous and valid reasons to use Tor to access publicly available information.
“WannaCrypt” is the malware that attacked and encrypted computer contents, globally, and then wormed its way through networks to other unpatched Windows computers.
The threat was so large and damaging, that Microsoft has released patches for no longer supported operating systems Windows XP, Windows Server 2003 and Windows 8. Of interest, according to Microsoft, the WannaCrypt malware exploited a previously patched vulnerability in Windows 7 and Windows Server 2008 and did not have any impact on systems running Windows 10.
For information see the Microsoft blog.
This is real, not a fake. This is based on the Face2Face technology developed at Stanford University. The facial movements of the actor are automatically translated to the “target” – several examples using well known politician’s faces.
In light of the global ransomware attack that took place the past couple of days, this is more true than ever:
Securing sensitive data generated by IoT devices is already the top concern of most security professionals (36%).
This is followed closely by privacy violations related to data generated by IoT devices (30%).
Cyber attacks are also a growing threat as more connected devices join the IoT ecosystem.
Source: IoT Security – Combining Innovation with Protection
Surveys suggest consumers are not that concerned about #IoT security and privacy threats – they should be very concerned!
234 Android apps have been identified as using your phone to monitor TV advertising effectiveness:
The apps silently listen for ultrasonic sounds that marketers use as high-tech beacons to indicate when a phone user is viewing a TV commercial or other type of targeted audio. A representative sample of just five of the 234 apps have been downloaded from 2.25 million to 11.1 million times, according to the researchers, citing official Google Play figures. None of them discloses the tracking capabilities in their privacy policies.
Source: More Android phones than ever are covertly listening for inaudible sounds in ads | Ars Technica
The audio maker Bose, whose wireless headphones sell for up to $350, uses an app to collect the listening habits of its customers and provide that information to third parties—all without the knowledge and permission of the users, according to a lawsuit filed in Chicago on Tuesday.
Source: Bose Headphones Secretly Collected User Data – Lawsuit | Fortune.com
The primary business model of the Internet, and by corollary The Internet of Things, is surveillance. This NBC News report describes many other devices that have been surveying their customers habits. As spying on customers becomes routine, it seems the only thing they’ve done wrong was fail to disclose their spying to the customers. Since most people do not read privacy agreements, most companies may legally spy on their customers, as long as it is disclosed.