The Art of Surveillance: Exposed by Dries Depoorter
Provocative tech artist Dries Depoorter exposes the many ways you’re being watched. The post The Art of Surveillance: Exposed by Dries Depoorter appeared first on Make: DIY Projects and Ideas for Makers......»»
Novel coronaviruses are riskiest for spillover
In the past decade, scientists have described hundreds of novel viruses with the potential to pass between wildlife and humans. But how can they know which are riskiest for spillover and therefore which to prioritize for further surveillance in peopl.....»»
Dolphins exposed to oil from Deepwater Horizon spill found to have changes in gene activities
A team of researchers affiliated with multiple institutions in the U.S., has found that dolphins living in the area where the Deepwater Horizon oil spill occurred have experienced changes in gene activity. In their paper published on the open-access.....»»
Plex data breach exposed email addresses and encrypted passwords
A Plex data breach has exposed usernames, email addresses, and encrypted passwords. The scale of the security failure is not yet known, but the company is requiring all users to change their passwords. The issue was compounded by Plex servers not ha.....»»
Ring patched an Android bug that could have exposed video footage
After a chain of attacks, security firm got access to locations and recordings. Enlarge / Ring camera images give you a view of what's happening and, in one security firm's experiments, a good base for machine learning surveillance. (c.....»»
Old laptop hard drives will allegedly crash when exposed to Janet Jackson music
Problem has been assigned an official CVE ID, despite lack of specifics. Enlarge (credit: Western Digital) It sounds like something out of an urban legend: Some Windows XP-era laptops using 5400 RPM spinning hard drives can al.....»»
Vulnerability in Amazon Ring app allowed access to private camera recordings
A vulnerability in the Android version of the Ring app, which is used to remotely manage Amazon Ring outdoor (video doorbell) and indoor surveillance cameras, could have been exploited by attackers to extract users’ personal data and device’s.....»»
Microsoft employees accidentally exposed login credentials for important internal systems
It's an open secret that Microsoft has a $15 billion cybersecurity business outpacing all other products and services the company offers. Office 365, Azure, and Xbox are still big cash cows for the Redmond giant, but it's hard to ignore the fact that.....»»
Website that lets you send poop through the post gets hacked
Customer data exposed, but exact details are unsurprisingly scarce......»»
In cities, a higher income means more protection against noise pollution
Too much noise is detrimental to health, leading to sleep disorders, increased blood pressure and cardiovascular disease. Those who are constantly exposed to increased noise levels without protection must even contend with a shorter life expectancy......»»
Signal privacy: Twilio phishing attack exposed some phone numbers, but no other data
A phishing attack on communications giant Twilio led to a Signal privacy compromise for around 1,900 users. Their phone numbers were exposed, along with SMS verification codes that would allow an attacker to register accounts to a new device … mo.....»»
China factories ration power as heatwave sends demand soaring
Chinese lithium hub Sichuan province will ration electricity supply to factories until Saturday, state media reported, as a heatwave sends power demands soaring and dries up reservoirs......»»
1,900 Signal users exposed following Twilio breach
The attacker behind the recent Twilio data breach may have accessed phone numbers and SMS registration codes for 1,900 users of the popular secure messaging app Signal. “Among the 1,900 phone numbers, the attacker explicitly searched for three.....»»
1,900 Signal users’ phone numbers exposed by Twilio phishing
No message, profile, or other data exposed—but SMS remains a weakness. Enlarge / Signal's security-minded messaging app is dealing with a third-party phishing attempt that exposed a small number of users' phone numbers. (credit: Gett.....»»
European drought dries up rivers, kills fish, shrivels crops
Once, a river ran through it. Now, white dust and thousands of dead fish cover the wide trench that winds amid rows of trees in France's Burgundy region in what was the Tille River in the village of Lux......»»
Amazon"s new clip show "Ring Nation" will try to make surveillance fun
Amazon is working on a television show compiling videos taken from Ring security cameras. Called Ring Nation, the clip show will be hosted by comedian Wanda Sykes and serve as an ever-timely reminder that privacy is eroding into nothing more than a v.....»»
Amazon studio plans lighthearted show of Ring surveillance footage
Company with notable footage-sharing issues wants to do it more, but funny. Enlarge / Amazon's combining its endless reach with its constant surveillance—but for laughs. (credit: Getty Images) For some people, the term "Ring.....»»
FTC weighs sweeping new rules on "commercial surveillance" and Big Data
The Federal Trade Commission is considering whether to write sweeping new regulations that could restrict how businesses collect and use consumer data, hinting at a possible crackdown on commercial algorithms and a sprawling economy powered by the pe.....»»
FTC will begin exploring new regulations on data privacy, corporate surveillance
The Federal Trade Commission has kickstarted an effort to expand data privacy rules and regulations that could place additional restrictions on how firms collect and use personal information.Credit: InvestopediaOn Thursday, the FTC announced that it.....»»
HomeKit Secure Video: Why it’s great and why you should use it
Apple's HomeKit Secure Video is a layered and resourceful way to store surveillance footage, and here's why you should start using it right away......»»
Code42 collaborates with Nullafi to prevent data exfiltration by high-risk and departing employees
Code42 Software collaborates with Nullafi to restrict access to regulated data – financial, healthcare, Personally Identifiable Information (PII) – or other sensitive data that may be accidentally or maliciously exposed by insiders. By limiting t.....»»