cyber security experts say that weaving your personal and professional lives together via a work laptop is risky business — for you and the company. Software technology company Check Point conducted a survey of over 700 IT professionals which revealed that nearly two-thirds of IT pros believed that recent high-profile breaches were caused by employee carelessness.
DON’T: Save personal passwords in your work device keychain.
DON’T: Make off-color jokes on messaging software.
DON’T: Access free public wi-fi while working on sensitive material.
DON’T: Allow friends or non-IT department colleagues to remotely access your work computer.
DON’T: Store personal data.
DON’T: Work on your side hustle while at the office.
Section 702 — that authorizes them to monitor some Americans’ communications without a warrant.
The spy agencies are supposed to “minimize” details about people swept up in what they call such “incidental collection,” and they say their practices are regularly vetted by Congress and the Foreign Intelligence Surveillance Court.
shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.
One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.
Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.
Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services
EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.
“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.
The 188-page “Challenging Government Hacking In Criminal Cases” report, released by the American Civil Liberties Union on March 30, addresses new amendments to Rule 41 of the Federal Rules of Criminal Procedure, which took effect last December.
Under the changes to criminal procedure rules, feds can remotely search computers in multiple jurisdictions with a single warrant. The rules are touted by law enforcement agencies as a way to streamline 100-year-old rules of criminal procedure
Apple, Google and Motorola declined to comment on WikiLeaks’ claims. Samsung didn’t respond to a request for comment.
“The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” said Moxie Marlinspike, the founder of Signal. “This story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we’re doing is working.”
Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is “misleading.” WhatsApp declined to comment.
“Framework and Terminology for Understanding Cyber-Enabled Economic Warfare,” a new report by Samantha F. Ravich and Annie Fixler for the Foundation for Defense of Democracies.
Cyber-enabled economic warfare is a “hostile strategy involving attack(s) against a nation using cyber technology with the intent to weaken its economy and thereby reduce its political and military power.”
For example, China’s economic theft of intellectual property from the U.S. is considered CEEW, along with Russia’s cyberattack on Estonia and Iran’s Saudi Aramco attack. The authors also contend that the U.S. sanctions on Iran using cyber means to cut off Society for Worldwide Interbank Financial Telecommunication access also falls under CEEW.
Only recently, the general view in the U.S. was that the less-free Chinese system created a poor environment for tech innovation. Put somewhat simply, the argument was that in a society without our kind of freedom of speech or unrestricted access to communication such as the Internet, people would miss out on information and ideas that come from a free system and feel more psychologically constrained from venturing off the beaten path with innovative ideas. The Chinese would be limited, in this view, to knock-offs of U.S. technologies.
The government has also cracked down on use of virtual private networks that Chinese, especially young people, have used to “climb the wall” (i.e. find sites outside the “Great Firewall of China”). And recently, there were media complaints that at the top elite universities such as Tsinghua the anti-VPN policy was not being enforced strictly enough.
Clearly, though, Chinese progress has taken place despite these restrictions.
we should not naively assume that all good (or bad) things go together. Maybe freedom of political and cultural expression is not as important as we have thought for advances, say, in information technology. But it still might be more important for development of less technical or scientific ideas such as public policy proposals or cultural expressions.
So much for that bipartisan Senate bid to prevent the FBI from gaining expanded hacking powers. Senators Ron Wyden, Chris Coons and Steve Daines have failed to block changes to the US’ criminal procedure rules (specifically, Rule 41) that would let the FBI hack computers in any jurisdiction provided they have a search warrant. Texas Senator John Cornyn and other Republican leaders thwarted the measure. The rule change should take effect on December 1st, barring surprises.