The Internet of Things Connectivity Binge: What Are the Implications?

29 01 2018

The Pew Research Center has released a report surveying experts about the security implications of the Internet of Things. The survey found a broad consensus that growth in the IoT will bring with it an increased risk of real-world physical harm. “The essential problem is that it will be impractical for people to disconnect,” said EPIC President Marc Rotenberg in the survey. “Cars and homes will become increasingly dependent on internet connectivity. The likely consequence will be more catastrophic events.” The ACM recently released a Statement of IoT Privacy and Security, which lists principles for protecting privacy and security in IoT devices. EPIC has been at the forefront of policy work on the Internet of Things, recommending safeguards for connected cars, “smart homes,” consumer products, and “always on” devices.

more

The content in this post was found at https://epic.org/2017/06/pew-survey-explores-internet-o.html Clicking the title link will take you to the source of the post. and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

PEW report:

BY AND

<http://www.pewinternet.org/2017/06/06/the-internet-of-things-connectivity-binge-what-are-the-implications/>

 

Powered by WPeMatico



The latest NSA leak is a reminder that your bosses can see your every move

29 01 2018

The case of Reality Winner, the 25-year-old woman arrested and accused of linking classified information, shows the limits of your privacy at work.

more

The content in this post was found at https://www.washingtonpost.com/news/the-switch/wp/2017/06/07/the-latest-nsa-leak-is-a-reminder-that-your-bosses-can-see-your-every-move/ Clicking the title link will take you to the source of the post. and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

Powered by WPeMatico



Advanced CIA firmware has been infecting Wi-Fi routers for years

27 01 2018
Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices. That’s according to secret documents posted Thursday by WikiLeaks.

CherryBlossom, as the implant is code-named, can be especially effective against targets using some D-Link-made DIR-130 and Linksys-manufactured WRT300N models because they can be remotely infected even when they use a strong administrative password. An exploit code-named Tomato can extract their passwords as long as a default feature known as universal plug and play remains on. Routers that are protected by a default or easily-guessed administrative password are, of course, trivial to infect. In all, documents say CherryBlossom runs on 25 router models, although it’s likely modifications would allow the implant to run on at least 100 more.

more 

The content in this post was found at https://arstechnica.com/security/2017/06/advanced-cia-firmware-turns-home-routers-into-covert-listening-posts/ Clicking the title link will take you to the source of the post. and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

 

Powered by WPeMatico



Appeals Court Considers Case that Aligns Privacy and FOI

27 01 2018

The Ninth Circuit U.S. Court of Appeals heard oral arguments today in an open government case with implications for informational privacy. A group of anonymous medical employees challenged the release of personal information sought under a state public records act. EPIC filed a “friend-of-the-court” brief in the case arguing that withholding personal information is consistent with open government and constitutionally required. “Open government laws and privacy laws are complimentary: the aim is to maximize both the public’s access to information about the government and to safeguard personal privacy to the greatest extent feasible,” EPIC wrote. EPIC has argued for similar privacy protections in ATF v. Chicago, Chicago Tribune v. University of Illinois, Ostergren v. Cuccinelli, NASA v. Nelson, and FCC v. AT&T.

more

The content in this post was found at https://epic.org/2017/07/appeals-court-considers-case-t.html Clicking the title link will take you to the source of the post. and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

Powered by WPeMatico



What happens if a cop forces you to unlock your iPhone X with your face?

22 01 2018

The introduction of Face ID instantly led to questions among civil liberties experts, who say the technology raises the risk of abuse.

more

The content in this post was found at https://www.washingtonpost.com/news/the-switch/wp/2017/09/13/what-happens-if-a-cop-forces-you-to-unlock-your-iphone-x-with-your-face/ Clicking the title link will take you to the source of the post. and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

Powered by WPeMatico