Spying

Stingray and Hailstorm

Security researchers say they have developed a new technique to detect modern cell-site simulators. Little is known about stingrays that exploit flaws in the way that cell phones connect to 2G cell networks, because they are deliberately shrouded in secrecy. Most of those flaws are fixed in the 4G networks, though not all. Newer cell

Mobile Apps Are Selling Your Location

https://www.tomsguide.com/us/apps-selling-location,news-28798.html Back in October, Tom’s Guide reportedthat it’s possible for cheap mobile advertisements to spy on you through your phone. Sales of location-targeted advertising reached an estimated $21 billion this year. This morning, a report from the New York Times warns that smartphone apps do that also for profit: More than 1,000 popular apps contain

EU censorship machines and link tax laws are nearing the finish line

Julia Reda (from European Parliament) writes at EU censorship machines and link tax laws are nearing the finish line page that EU governments agree on copyright reform, that needs EU parliament approval, to let news sites charge aggregators for snippets, force upload filters on websites. This sound to me like a pretty bad idea based

A bug in cell phone tracking firm’s website leaked millions of Americans’ real-time locations | ZDNet

https://www.zdnet.com/article/cell-phone-tracking-firm-exposed-millions-of-americans-real-time-locations/ Another week and another privacy disaster. Now a company that collects the real-time location data on millions of cell phone customers across North America had a bug in its website that may have exposed nearly every cell phone customer in the US and Canada, some 200 million customers. The LocationSmart page required explicit consent

It’s Not Just Facebook That Knows A Horrifying Amount Of Stuff About You | IFLScience

http://www.iflscience.com/technology/its-not-just-facebook-that-knows-a-horrifying-amount-of-stuff-about-you/ It’s Not Just Facebook That Knows A Horrifying Amount Of Stuff About You. Following the recent Cambridge Analytica scandal, many people are expressing concern about Facebook and how much it knows about them. “If the product is free, you are the product. If they’re making money, they probably have a lot of your data

Permissionless data slurping: Why Google’s latest bombshell matters • The Register

https://www.theregister.co.uk/2017/11/22/permissionless_data_slurping_google/ Somebody else than just your mobile operator gets to know where you are: According to an old Chinese proverb: “When a wise man points at the Moon, an idiot looks at his finger.” Google may have been hoping that you were examining a finger, not reading a Quartz story yesterday, which reveals how Android phones send

No, you’re not being paranoid. Sites really are watching your every move | Ars Technica

https://arstechnica.com/tech-policy/2017/11/an-alarming-number-of-sites-employ-privacy-invading-session-replay-scripts/ If you have the uncomfortable sense someone is looking over your shoulder as you surf the Web, you’re not being paranoid. A new study finds hundreds of sites—including microsoft.com, adobe.com, and godaddy.com—employ scripts that record visitors’ keystrokes, mouse movements, and scrolling behavior in real time…

Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs

http://thehackernews.com/2017/07/ssh-credential-hacking.html?m=1 WikiLeaks has today published the 15th batch of its ongoing Vault 7 leak, this time detailing two alleged CIA implants that allowed the agency to intercept and exfiltrate SSH (Secure Shell) credentials from targeted Windows and Linux operating systems. BothanSpy implant is for Microsoft Windows Xshell client. Gyrfalcon targets the OpenSSH client on various distributions of Linux OS: CentOS,

OutlawCountry: CIA’s Hacking Tool For Linux Computers Revealed

https://fossbytes.com/outlawcountry-cia-hacking-tool-linux/ Wikileaks has published fresh documents that deal with the CIA’s hacking and spying on Linux machines using a malware strain called OutlawCountry. This tool consists of a kernel module that creates invisible netfilter table for creating new rules with iptables command. Those rules can modify and redirect the network traffic. The OutlawCountry’s prerequisites for operation are

Researchers train drones to use Wi-Fi to look through walls | TechCrunch

https://techcrunch.com/2017/06/19/researchers-train-drones-to-use-wi-fi-to-look-through-walls/?ncid=rss&utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=FaceBook&sr_share=facebook This is quite interesting -or frightening – WiFi radar application. A new system by University of California, Santa Barbara researchers Yasamin Mostofi and Chitra R. Karanam uses two drones, a massive Wi-Fi antenna, and a little interpolation to literally see through solid walls. One drone blasts Wi-Fi through the structure and another picks up the signal.