Libertés Numériques
97.1K views | +0 today
Libertés Numériques
Veille sur la sécurité et les libertés individuelles à l'heure d'Internet.
Your new post is loading...
Your new post is loading...

Principales Thématiques :

Current selected tag: 'Lisa Vaas'. Clear
Scooped by Aurélien BADET
Scoop.it!

DDoS-for-hire service is legal and even lets FBI peek in, says a guy with an attorney

DDoS-for-hire service is legal and even lets FBI peek in, says a guy with an attorney | Libertés Numériques | Scoop.it

Paying a site to DDoS other sites is perfectly legal, the proprietor behind one such outfit told security journalist Brian Krebs.

Besides which, he says, his service, called RageBooter, even features a nifty backdoor that lets the FBI monitor customer activity.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Revenge-porn website victim files suit against ex and four porn sites

Revenge-porn website victim files suit against ex and four porn sites | Libertés Numériques | Scoop.it

A US woman in the state of Florida has filed charges against her ex-boyfriend and four websites for posting revenge porn images of her - i.e., nude photos and/or videos, including private facts and details of the victim, posted online without the subject's consent.

Holly Jacobs (a name she assumed at some point during the four years she says she's suffered repercussions) filed suit on April 18 against sextingpics.com, anonib.com, pinkmeth.tv and xhamster.com, as well as against ex-boyfriend Ryan Seay, for the "public disclosure of private facts" and "intentional infliction of emotional distress."

This is the second of two well-publicized suits against sites that enable revenge porn.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

US child abuse image suspect shielded from decrypting hard drives

US child abuse image suspect shielded from decrypting hard drives | Libertés Numériques | Scoop.it

A US federal magistrate has refused to order a Wisconsin computer scientist and child abuse image suspect, Jeffrey Feldman, to decrypt the hard drives the government seized from him.

The rationale of Magistrate William Callahan Jr. of Wisconsin: the Fifth Amendment to the US Constitution shields citizens from being compelled to self-incriminate.

Callahan wrote [PDF, posted courtesy of Wired] that, unlike in similar cases, where the government has compelled people to unlock the encrypted portions of their hard drives, in this case, Feldman hasn't admitted that he has access and control of the hardware.

This is in spite of the many storage devices in question having been found in his house, where he's lived alone for 15 years.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Facebook launches privacy campaign to protect teens

Facebook launches privacy campaign to protect teens | Libertés Numériques | Scoop.it

Facebook, under pressure to educate teenagers on staying safe on the site, has teamed up with 19 US attorneys general to launch a privacy public awareness campaign.

Facebook and the AGs announced the campaign on Monday during a National Association of Attorneys General (NAAG)-sponsored conference devoted to digital privacy, according to CFOWorld.com.

Teaching teenagers about data privacy is going to be an uphill battle.

Facebook has a tough enough row to hoe when it comes to staying relevant with this demographic, given that many youth today find Facebook flat-out boring.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Many Amazon S3 cloud storage users are exposing sensitive company secrets, claims report

Many Amazon S3 cloud storage users are exposing sensitive company secrets, claims report | Libertés Numériques | Scoop.it

Approximately one in six Amazon S3 storage buckets are full of holes, leaking sensitive data and company secrets, claims a new report.

Amazon Simple Storage Service (S3) is a web services interface for storing and retrieving static data from Amazon's cloud that gives developers a way to store and access, for example, server backups, company documents, web logs, and publicly visible content, including images and PDFs.

Such content is organized into "buckets", accessible at predictable URLs.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Google Glass: the ultimate creepy stalker toy?

Google Glass: the ultimate creepy stalker toy? | Libertés Numériques | Scoop.it
Google's internet-enabled head gear, due to be released this year, promises to be a privacy nightmare, what with the capability to surreptitiously record photos, video and audio of the wearer's surroundings.
No comment yet.
Scooped by Aurélien BADET
Scoop.it!

100,000+ Americans demand legal right to unlock phones be legal

100,000+ Americans demand legal right to unlock phones be legal | Libertés Numériques | Scoop.it

On Saturday January 26, US citizens lost the right to unlock our mobile phones.

On Thursday February 21, two days before the deadline to get enough petition signers to trigger the administration into re-examining an issue, 100,000 annoyed people demanded that that right be given back.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Ticketmaster says goodbye to CAPTCHA

Ticketmaster says goodbye to CAPTCHA | Libertés Numériques | Scoop.it

Human? Not a robot? Says you! Take this test to prove it:

What's at times essentially illegible, fuses characters together into melted blobs of unrecognizable goo, and occasionally tells you to go f**k yourself?

If you answered "CAPTCHA", congratulations - you're made out of carbon!

Because of this, it's unlikely you will robotically buy up reams of tickets and sell them at vicious markups, and therefore, Ticketmaster, the world's largest online ticket retailer, will be happy to sell to you.

Now, though, Ticketmaster is going to sell tickets without torturing your eyeballs with the use of CAPTCHA.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Governments increasingly strong-arm Twitter for data

Governments increasingly strong-arm Twitter for data | Libertés Numériques | Scoop.it

Governments' hunger for Twitter data continues to spiral upward.

Twitter on Monday released its second Transparency Report to coincide with #DataPrivacyDay.

When Twitter released its first Transparency Report last July, it noted that it had received more government requests in the first half of 2012 than in the entirety of 2011.

Judging by this second report, governments are on track to keep breaking their own records. The latest report shows that governments requested Twitter users' account data 1,009 times in the second half of 2012.

That compares to 849 requests in the first half of 2012 and reflects governments' growing taste for what Twitter itself labels "invasive requests" for information.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Mobile apps for kids collecting and sharing information with third parties

Mobile apps for kids collecting and sharing information with third parties | Libertés Numériques | Scoop.it
Many mobile apps aimed at children are sharing personal information - such as device ID, geolocation and phone numbers - with third parties, all without notifying parents or asking for permission.

A number of mobile apps also contain advertising, in-app purchasing ability, and links to social media. Some even send information to ad networks, analytics companies, or other third parties, all without disclosing such features to parents prior to download.
No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Facebook privacy control overhaul will remove ability to limit who can find us

Facebook privacy control overhaul will remove ability to limit who can find us | Libertés Numériques | Scoop.it
Are you suffering from CFF - Chronic Facebook Fatigue? The mental and bodily malaise that comes from constant tweaking of privacy options in the Land of the Face?
Fear not, for the most recent round of changes, announced today, carry some good privacy tidings, including privacy shortcuts from the main page drop-down menu, plus a new Request Removal tool for managing multiple photos in which you have been tagged.
No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Anonymous goes after Hunter Moore, the infamous revenge-porn website publisher

Anonymous goes after Hunter Moore, the infamous revenge-porn website publisher | Libertés Numériques | Scoop.it

Those claiming to be affiliated with Anonymous have declared war on the internet's most hated man, Hunter Moore, who gained infamy by publishing pornographic photos of people without their permission, in fulfillment of the wishes of their bitter exes.A statement published on Pastebin called worldwide Anonymous members to action in the name of "[making] a real difference in the lives of hundreds of bullied teenagers and protect [sic] them from real harm such as rape or stalking."

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Pentagon OKs Androids, BlackBerrys for soldiers

Pentagon OKs Androids, BlackBerrys for soldiers | Libertés Numériques | Scoop.it

The US Department of Defense (DoD) announced on Thursday that it has approved the use of Samsung phones running a hardened version of Android.

According to the BBC, the approval for other types of smartphones and mobile devices for use by US soldiers is coming soon.

Specifically, approval for other Android devices and for Apple phones and tablets is expected later this month.

According to Federal News Radio, the move is part of a broader DoD plan to more than double the number of secure mobile devices used by armed forces by 2014.

The approved Samsung smartphones will run a hardened version of Android called Knox.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Troll admits to making death threats against children on Facebook

Troll admits to making death threats against children on Facebook | Libertés Numériques | Scoop.it

Seventeen-year-old Caitlin Talley, of the US state of Tennessee, was killed in October after being thrown from a pickup truckin a violent crash that police believe involved a drunken driver.

As many mourners have done, those who loved Talley erected a memorial Facebook page in her honor.

Reece Elliott, 24, of South Shields, UK, has admitted that in February, he signed on to that tribute page under a false name and threatened to kill "at least" 200 people.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Why facial recognition couldn't identify Boston bombing suspects

Why facial recognition couldn't identify Boston bombing suspects | Libertés Numériques | Scoop.it

We had scores of still images, pored over by both official investigators and self-appointed ones on Reddit.

We had hours of video footage.

The suspects' images were on file. The FBI had even previously targeted Tamerlan Tsarnaev as a person of interest.

Why, then, didn't facial recognition technology help to winnow down the thousands of images and help to identify Tamerlan and his brother, Dzhokhar Tsarnaev, the two suspects behind the Boston Marathon bombings?

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Powerful new personal data disclosure bill proposed by California lawmaker

Powerful new personal data disclosure bill proposed by California lawmaker | Libertés Numériques | Scoop.it

Stop me if you've heard this one:

A consumer goes into a bar and walks up to a data broker.

"So tell me, where do you get data on me and 500 million other consumers?" she asks.

"Drop dead," the data broker says.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Facebook plugs Timeline privacy hole

Facebook plugs Timeline privacy hole | Libertés Numériques | Scoop.it

Europe v. Facebook, an Austrian student organization that keeps tabs on Facebook's privacy transgressions, recently discovered that Facebook's latest timeline redesign allowed friends of friends to see the total number of Eventsa user has attended, even if that person's privacy settings were set to only allow friends to see such events.

This screw-up allowed for unintended sharing of sensitive information, such as political beliefs and sexual orientation, the group said in a release.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Samsung Galaxy security vulnerability unlocks homescreen

Samsung Galaxy security vulnerability unlocks homescreen | Libertés Numériques | Scoop.it

If you're nimble enough, you can get past the Galaxy Note 2's lock screen. And PIN. And password. And face unlock. Terence Eden recently discovered the minor security vulnerability in Samsung's Note 2 smartphone-tablet hybrid.

Much like the iPhone passcode hack from last week, this Galaxy glitch involves lightning-fast reflexes and a cancelled call to emergency services.

Given that the attack is of limited value, Eden provides full instructions on how to exploit it.

If you follow his instructions, which we hope you don't, given that this attack once again relies on placing bogus emergency calls, you can run apps and dial numbers on phones - even if they're locked with a pattern lock, PIN, password, or face unlock.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Twitter looking to hire two-factor authentication brains

Twitter looking to hire two-factor authentication brains | Libertés Numériques | Scoop.it

Just a few days after Twitter reset passwords and revoked session tokens for 250,000 possibly hacked user accounts,the king of social media succinctness has apparently moved to implement two-factor authentication. The Guardian picked up on the move after spotting this help-wanted ad for a software engineer in product security.

Twitter says, if you like to code and if you like security, do they have the perfect position for you! The position is asking for someone who will "design and develop user-facing security features, such as multifactor authentication and fraudulent login detection". Two-factor authentication requires users to enter a per-transaction or per-session code. In essence, a disposable, single-use password.

It's one small extra step for users, but it's one big headache for cyber trespassers.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

FBI intent on sniffing out those who leaked possible US Stuxnet role

FBI intent on sniffing out those who leaked possible US Stuxnet role | Libertés Numériques | Scoop.it

Federal investigators in the US are tightening the screws on former senior government officials who might have leaked info about the Stuxnet worm, according to The Washington Post.

Last June, Attorney General Eric H. Holder Jr. started the inquiry into loose lips.

As Naked Security recounts here, the Stuxnet virus was seemingly created by the US, under the regime of President George W. Bush, to target Iran's nuclear facility in Natanz.

The US pulled Israel into the cyber-espionage effort, with stunning results.

Those results included slowing down and speeding up a centrifuge's delicate parts, which resulted in damage so extreme that, according to The New York Times, debris from a damaged centrifuge was laid across the conference table at the White House's Situation Room to demonstrate the malware's potential power.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Texas student appeals court order to wear "Mark of the Beast" RFID tracking badge

Texas student appeals court order to wear "Mark of the Beast" RFID tracking badge | Libertés Numériques | Scoop.it

A Texas high school student in the US on Tuesday was ordered to wear an RFID tracking badgethat she claims bears the "mark of the beast", but by Friday she had turned the case right back around, asking a federal appeals court to overturn the order to either wear a chip-less badge or change schools.


On Tuesday, a lower federal court had concluded that 15-year-old sophomore Andrea Hernandez's right of religion had not been breached by the mandated tag.

 

 

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Cyber attackers seize, encrypt and ransom medical centre's patient database

Cyber attackers seize, encrypt and ransom medical centre's patient database | Libertés Numériques | Scoop.it
Cyber attackers have breached an Australian medical centre's patient database, encrypted it, and are demanding $4,000 AUD to release thousands of patient records - a sum the medical centre is trying hard not to pay.

The records were collected over seven years and stored on a server at the Miami Family Medical Centre in Queensland.

Law enforcement say that the attack originated in Russia or somewhere in Eastern Europe, but origins of such attacks are notoriously difficult to pinpoint.
No comment yet.
Scooped by Aurélien BADET
Scoop.it!

What computer security threats can we expect to see in 2013?

What computer security threats can we expect to see in 2013? | Libertés Numériques | Scoop.it

Earlier this week, Sophos released the latest edition of its Security Threat Report, summing up the biggest threats seen during 2012, along with five trends that are likely to factor into IT security in the coming year.

No comment yet.
Scooped by Aurélien BADET
Scoop.it!

Nuclear power plant cybersecurity warnings silenced by legal threats

Nuclear power plant cybersecurity warnings silenced by legal threats | Libertés Numériques | Scoop.it

Legal threats have silenced security warnings at a recent systems-control conference.Two talks at a recent US conference on cyber security in critical infrastructure were pulled from the agenda after a supplier of nuclear power plant equipment threatened to sue, worried that open discussion of vulnerabilities would reveal too much - even though the presentations had been approved by the power plant in question.

No comment yet.