The Art of Surveillance: Exposed by Dries Depoorter
Provocative tech artist Dries Depoorter exposes the many ways you’re being watched. The post The Art of Surveillance: Exposed by Dries Depoorter appeared first on Make: DIY Projects and Ideas for Makers......»»
Google sign-up "fast track to surveillance", consumer groups say
Ten European consumer organisations join forces to launch complaints to privacy and data regulators.....»»
Google sign-up a "fast track to surveillance", consumer groups say
Ten European consumer organisations join forces to launch complaints to privacy and data regulators.....»»
Nearly 1 in 4 globally at risk from severe flooding: study
Almost a quarter of the world's population are exposed to significant flood risks, according to new research published Tuesday, which warned those in poorer countries were more vulnerable......»»
New report outlines how civil aviation could navigate post-pandemic funding
The global pandemic has exposed some structural flaws in the funding models for air navigation service providers (ANSP), a critical component in the safety of the civil aviation industry, according to a new international study involving Western profe.....»»
Researchers study plants sprouting from century-old seeds after excavation
At a Toronto Port Lands construction site on the city's waterfront, keen-eyed workers recently spotted plants that had sprouted from soil recently exposed by the removal of tons of earth. The plants were hard stem bulrush and cattails, which are comm.....»»
Chinese surveillance and a post-Roe world may need Apple to go even further on privacy
The scale and reach of Chinese surveillance of its own citizens is well documented, but a new piece shows that the country’s government is now trying to use this vast trove of data to predict crimes and protests before they happen. The Supreme Cou.....»»
AOET developing non-notebook-use optical lenses
Ability Opto-Electronics Technology (AOET), in a bid to diversify its product lines, has been developing precision optical lenses for devices other than notebooks, including automotive cameras, smart surveillance systems, drones and facial/iris reco.....»»
Clearview fine: The unacceptable face of modern surveillance
The UK’s Information Commissioner’s Office (ICO) has issued its third largest ever fine of £7.5m. It was imposed on Clearview AI, the controversial facial recognition company that has already been on the wrong end of similar decisions from regul.....»»
How China"s Expanding Surveillance Allows the State to Tighten Its Grip
"China's ambition to collect a staggering amount of personal data from everyday citizens is more expansive than previously known," reports the New York Times, after their Visual Investigations team with reporters in Asia "spent more than a year analy.....»»
Security Flaws in Internet-Connected Hot Tubs Exposed Owners" Personal Data
A security researcher found vulnerabilities in Jacuzzi's SmartTub interface that allowed access to the personal data of every hot tub owner. From a report: Jacuzzi's SmartTub feature, like most Internet of Things (IoT) systems, lets users connect to.....»»
Indian tech veterans seek Taiwan partnership to make electronics
India's electronics market is flooded with overseas products, especially from China. Despite several attempts from the government and industries in the past, local manufacturing of everyday products like LED lights, surveillance cameras, tablets, and.....»»
There Are 24.6 Billion Pairs of Credentials For Sale On Dark Web
An anonymous reader quotes a report from The Register: More than half of the 24.6 billion stolen credential pairs available for sale on the dark web were exposed in the past year, the Digital Shadows Research Team has found. Data recorded from last y.....»»
Russia is taking over Ukraine’s Internet
Traffic from occupied Ukraine subjected to Russia's censorship, surveillance machine. Enlarge / A placard seen being displayed during a 2019 protest against state internet control in Russia. Displaying the placard now would likely land.....»»
US Defence Contractor in Talks To Take Over NSO Group"s Hacking Technology
The US defence contractor L3Harris is in talks to take over NSO Group's surveillance technology, in a possible deal that would give an American company control over one of the world's most sophisticated and controversial hacking tools. From a report:.....»»
Spyware firm NSO Group could be acquired by US defense contractor
Pegasus spyware maker NSO Group, which has been beset by controversy, could be acquired by a US defense contractor named L3Harris.NSO Group headquarters in Israel.The Israeli-based cyber surveillance is currently moving toward a deal to be acquired b.....»»
(IN)SECURE Magazine: RSAC 2022 special issue released
RSA Conference concluded its 31st annual event at the Moscone Center in San Francisco on Friday, June 10. Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive.....»»
Ukraine War"s supply chain impacts bust myth of US energy independence
The global impacts of Russia's invasion of Ukraine have exposed vulnerabilities in U.S. energy security and undercut the myth that the United States, or any other major manufacturing economy, is truly energy independent yet, according to an analysis.....»»
As the Great Salt Lake Dries Up, Utah Faces "An Environmental Nuclear Bomb"
The state of Utah has the largest saltware lake in the entire western hemisphere — but it's like the tide went out and never came back, warns the New York Times. [Alternate URL here.] "If the Great Salt Lake, which has already shrunk by two-.....»»
Targeted wastewater surveillance has a history of social and ethical concerns
Wastewater surveillance involves testing sewage to obtain data about a population's health. While the technique is decades old, it has gained recent international prominence for its ability to predict pandemic surges, detect new SARS-CoV-2 variants a.....»»
The most common exploit paths enterprises leave open for attackers
Exposed version control repositories, leaked secrets in public code repositories, a subdomain vulnerable to takover, exposed Amazon S3 buckets, and Microsoft Exchange Server servers vulnerable to CVE-2021-42321 exploitation are the most common exploi.....»»