CovertBand uses high-frequency audio to place people in a room and track a person's movements using the speakers and microphones that are found in many smartphones, laptops and other devices.
Researchers have demonstrated how hackers could track a person's movements using the speakers and microphones that are found in many smartphones, laptops and other devices. According to research by the University of Washington, hackers could embed a high-frequency sound in audio recordings that acts as a sonar. Sound waves would bounce off people and objects and this is picked up by a microphone.Read more
More than a dozen high technology companies and the biggest wireless operator in the United States, Verizon Communications Inc, have called on the U.S. Supreme Court to make it harder for government officials to access individuals' sensitive cellphone data.
The companies filed a 44-page brief with the court on Monday night in a high-profile dispute over whether police should have to get a warrant before obtaining data that could reveal a cellphone user's whereabouts. Signed by some of Silicon Valley's biggest names, the brief said that as individuals' data is increasingly collected through digital devices, greater privacy protections are needed under the law.Read more
A single threat actor has aggressively bombarded Android users with more than 4,000 spyware apps since February, and in at least three cases the actor snuck the apps into Google's official Play Market, security researchers said Thursday.
Soniac was one of the three apps that made its way into Google Play, according to a blog post published Thursday by a researcher from mobile security firm Lookout. The app, which had from 1,000 to 5,000 downloads before Google removed it, provided messaging functions through a customized version of the Telegram communications program.Read more
After disclosing CIA's strategies to hijack and manipulate webcams and microphones to corrupt or delete recordings, WikiLeaks has now published another Vault 7 leak, revealing CIA's ability to spy on video streams remotely in real-time.
Dubbed 'CouchPotato,' document leaked details how the CIA agents use a remote tool to stealthy collect video streams. CouchPotato gives CIA hackers ability to "collect either the stream as a video file (AVI) or capture still images (JPG) of frames from the stream that are of significant change from a previously captured frame," a leaked CIA manual reads.Read more
AnchorFree, the California-headquartered company behind the popular virtual private network service Hotspot Shield, has been accused of "unfair and deceptive trade practices" by a US privacy group for allegedly over-collecting user data for advertising purposes.
"Hotspot Shield engages in logging practices and uses third-party tracking libraries to facilitate targeted advertisements," read the 12-page complaint, filed by the US Centre for Democracy and Technology to the Federal Trade Commission. Hotspot Shield "monitors information about users' browsing habits while the VPN is in use," the legal filing stated.Read more
The Walt Disney Company is facing a lawsuit alleging it violated federal law aimed at protecting children’s online privacy. The company allegedly allowed ad tech companies to embed software in its apps, enabling the collection of children’s personal information.
The class-action suit claims that children playing Disney’s mobile games have been personally identified by Disney and that their data was scooped up for the purpose of future “commercial exploitation.” The complaint, naming as plaintiff Amanda Rushing and her child, along with others similarly situated, was filed Thursday in the US District Court for the Northern District of California.Read more
A new hacking tool used by the CIA has been revealed by WikiLeaks. The tool disables security cameras and corrupts recordings made on computers using Windows XP and newer versions of the Microsoft operating system. Dubbed 'Dumbo', it requires an agent to directly access a computer that holds the recordings using a USB thumb drive.
WikiLeaks released information about project Dumbo on its website today. WikiLeaks said: 'Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating system.Read more
Android phone maker Blu Products was dealt a blow when Amazon said it would no longer sell its phones, citing security and privacy issues. The phone maker came under scrutiny last week by researchers at Kryptowire during a Black Hat session where they criticized the company for collecting personal identifiable information without user consent.
“Because security and privacy of our customers is of the utmost importance, all Blu phone models have been made unavailable for purchase on Amazon.com until the issue is resolved,” Amazon said. Blu Product phones are Amazon’s top unlocked Android phone seller and known for their affordable prices.Read more
A vulnerability in older Amazon Echo devices can be used to make the home assistant relay conversations to eavesdroppers while the owner remains none the wiser. Research by MWR InfoSecurity found it's possible to turn an Amazon Echo into a covert listening device without affecting its overall functionality.
One big limiting factor: the process does involve the attacker being able to gain access to the physical unit, but it's possible to tamper with the Echo without leaving any evidence. The vulnerability comes as a result of two design choices: exposed debug pads on the base of the device and a hardware configuration setting.Read more
It's going to be much harder to view the full web in Russia before the year is out. President Putin has signed a law that, as of November 1st, bans technology which lets you access banned websites, including virtual private networks and proxies. Internet providers will have to block websites hosting these tools.
The measure is ostensibly meant to curb extremist content, but that's just pretext -- this is really about preventing Russians from seeing content that might be critical of Putin, not to mention communicating in secret. Accordingly, the President has signed another law requiring that chat apps identify users through their phone numbers after January 1st, 2018.Read more