Be careful of what you ask for. That’s a lesson that Max Schrems of Vienna, Austria, learned the hard way when he sent a formal request to Facebook citing European law and asking for a copy of every piece of personal information that the world’s largest social network had collected on him.
Browsing Category: Social Engineering
Carrier IQ, the embattled software company at the center of the controversy over alleged data collection on mobile devices, has released a new document that details the ways in which carriers deploy the software, how it works on devices and what data it is capable of collecting. The company also admitted in the document that its software has a bug that, in some specific cases, could cause the application to collect the contents of SMS messages.
Pirates beware! The creator of a new Web based search engine says that linking you up with your (illegal) downloads is easier than you may think.
Scientists for the Pentagon’s far-out research branch, DARPA, weren’t sure that anyone would be able to collect the $50,000 prize when they announced their Shredder Challenge to find ways to reassemble shredded documents just over a month ago. This week – just 33 days later – they had a winner.
Officials at Cnet’s Download.com site have issued a statement apologizing for bundling the popular open source Nmap security audit application with adware that changed users’ search engine and home page to Microsoft properties. Fyodor, the author of Nmap, raised the issue earlier this week, saying that his app was being wrapped in malware on Download.com.
Teen pop sensation and Rachel Maddow look-alike, Justin Bieber, was not stabbed outside a Los Angeles nightclub, nor was he stabbed outside a nightclub in New York, as two current Facebook spam campaigns allege.
Dennis Fisher talks with Paul Judge of Barracuda Networks about the company’s Clicks For Meals program, which is aiming to provide 10,000 meals during the holidays through the World Food Programme.
A lot has been said about the Carrier IQ software, the way that it’s used by carriers and whether it’s capable of intercepting calls, texts and data on users’ handsets. It’s still not clear exactly what’s going on, but one lesson that has emerged from all of this is this: The mobile devices people buy and use for personal and sensitive taks every day simply do not belong to them.
Adobe said a previously undisclosed vulnerability in its Reader and Acrobat applications was passed along by defense contractor Lockheed Martin, raising the specter of a targeted attack on the important military supplier.
The controversy over stealthy monitoring software by CarrierIQ has raised important questions about user privacy and business ethics in the Brave New World of smart phones, tablets and the like. In the uproar over CarrierIQ’s surreptitious monitoring of mobile phone users, various tools have appeared that claim to be able to detect the software. However – removing CarrierIQ from your phone is another matter entirely. And,while some sites have offered instructions on doing so, Kaspersky Lab researcher Tim Armstrong said that, for all but a few mobile phone hardware experts, doing a CarrierIQ-pendectomy is a bad idea.