Google complied with 93 percent of the requests for user data that it received from U.S. law enforcement agencies through the first six months of this year. In the latest update to its Transparency Report, Google for the first time not only disclosed the number of requests that it receives, but also the number of user accounts that those requests encompass.
Browsing Tag: Privacy
Researchers at the Hackers To Hackers Conference in Brazil will detail a method of hijacking the TOR anonymity network, potentially putting its users at risk, while The Tor Project accuses one of the researchers of irresponsible disclosure.
Researchers from MIT and Georgia Tech have developed a new technique that enables them to use the accelerometer in an iPhone or other smartphone to capture keystrokes from a nearby PC and decipher the typed words with about 80 percent accuracy. The tactic, while quite complicated, could be used to conduct password-recovery or other attacks on unsuspecting victims.
The German government acknowledged on Tuesday that a trojan horse program used to perform lawful intercept is capable of far more than it was said to be. The confirmation comes after an analysis by hacking group The Chaos Computer Club (CCC) which alleged that the program may be in breach of the law.
In a landmark move, the Federal Trade Commission has settled charges it brought against the maker of a P2P file-sharing application that the commission alleged included unfair default settings that caused users to unknowingly share photos, videos and other personal data. The settlement with FrostWire LLC may well be an indication that the federal government is going to be taking a hard look at the way developers set up their apps and what users know about the data they collect and share.
With the use of social media platforms such as Twitter, Facebook and Google+ becoming more and more prevalent in the enterprise, companies are having to come to grips with additional security concerns that they bring with them. But, according to the results of a new survey of IT and security professionals, that process is still in its early stages in many companies.
With the release of the BEAST SSL attack research due tomorrow, researchers are beginning to take note of potential fixes and mitigations for the attack. One of the possibilities is moving to newer versions of TLS that are not vulnerable to the attack, but the problem is that there is precious little adoption of those newer versions.
Cars with OnStar’s built-in technology will begin having their where-abouts monitored in December, even if their owners opt-out of the service, according to a new privacy statement issued by the vehicle navigation and emergency notification service this week.