Search Results for “Wired”


June 17, 2020
Nico Grant / Bloomberg

Nico Grant / Bloomberg  
Zoom Says It Will Offer End-to-End Encryption to All Users, Free and Paid

Following pressure from members of Congress and the public who pushed the video-conferencing company to bolster privacy, meteoric conferencing app Zoom said it would offer full end-to-end encryption to all users, free and paid. Previously the company said it would provide the tighter encryption option only to paid customers. Those using the service at no charge will have to verify their phone numbers to get access to the strongest level of security.

Related: The Next Web, The Verge, Infosecurity Magazine, Tech Insider, Gizmodo, IGN All, Fortune, Tech.Co, WCCFtech, Android Authority, xda-developers, Protocol, EFF, Cyberscoop, Mashable, Firstpost, Wired, Schneier on Security, Motley Fool, Ars Technica, The Guardian, Pocket-lint, Dark Reading, WebProNews, iPhone Hacks, SlashGear » security, SiliconANGLE, AppleInsider, Wired, The Hill, MSPoweruser, Boing Boing, The Guardian, The Register – Security, Natasha Lomas – TechCrunch, Engadget, The Mac Observer, Daily Dot, Cult of Mac, Reuters, AppleInsider, Trusted Reviews, Neowin, Bleeping Computer, Slashdot, iTnews – Security, BGR, MobileSyrup.com

Tweets:@CyberScoopNews @EFF @schneierblog @viaCristiano @Wired

The Next Web: Zoom says it’ll provide end-to-end encryption even for free users now
The Verge: Zoom says free users will get end-to-end encryption after all
Infosecurity Magazine: Petitions Demand Zoom Changes End-to-End Encryption Stance
Tech Insider: 6 hot apps that Silicon Valley insiders are buzzing about
Gizmodo: Was That So Hard, Zoom?
IGN All: Private Internet Access VPN Review
Fortune: Zoom to offer all users full encryption, bending to pressure
Tech.Co: Zoom Will (Finally) Roll Out End-to-End Encryption For All Users
WCCFtech: Zoom Decides to Offer Encryption Plans for All Users in July
Android Authority: Zoom relents, will offer end-to-end encryption to every user, paid or not
xda-developers: [Update: Free Users in July] Zoom end-to-end encryption won’t be available to free users
Protocol: Zoom finds a balance between privacy and policy
EFF: VICTORY: Zoom Will Offer End-to-End Encryption to All Its Users
Cyberscoop: In reversal, Zoom says all users will have access to end-to-end encryption
Mashable: Zoom will offer end-to-end encryption to free users, with a catch
Firstpost: Zoom to offer end-to-end encryption for all users
Wired: Zoom Reverses Course and Promises End-to-End Encryption for All Users
Motley Fool: Zoom Brings End-to-End Encryption To Free Users, Too
Ars Technica: Amid pressure, Zoom will end-to-end encrypt all calls, free or paid
The Guardian: Zoom will provide end-to-end encryption to all users after privacy backlash
GeekWire: Zoom Will Be End-to-End Encrypted for All Users
The Verge: Zoom says free users will get end-to-end encryption after all
Pocket-lint: Zoom will offer free users end-to-end encryption if they verify their identity
Pocketnow: Zoom says end-to-end encryption will come to free users after all
Dark Reading: Privacy: Zoom Changes Course on End-to-End Encryption
Dark Reading: Privacy: Zoom Changes Course on End-to-End Encryption
WebProNews: Zoom Charts Path Toward End-to-End Encryption For All Users
iPhone Hacks: Zoom Reverts Own Decision, Plans to Bring End-to-End Encryption to All Users
SlashGear » security: Zoom to offer end-to-end encryption to free users but there’s a catch
SiliconANGLE: In reversal, Zoom will release end-to-end encryption feature for free users
AppleInsider: Zoom backtracks, says end-to-end encryption will be able to all users
The Next Web: Zoom says it’ll provide end-to-end encryption even for free users now
The Hill: Zoom to offer end-to-end encryption to all users beginning in July
Fortune: Zoom to offer all users full encryption, bending to pressure
MSPoweruser: Zoom does an about face on free End to End Encryption for video calls
Boing Boing: Plagued by security woes, Zoom promises end-to-end encryption starting in July
The Guardian: Zoom will provide end-to-end encryption to all users after privacy backlash
The Register – Security: Zoom will offer proper end-to-end encryption to free vid-chat accounts – not just paid-up bods – once you verify your phone number…
Natasha Lomas – TechCrunch: Zoom U-turns on no e2e encryption for free users
Neowin: Zoom will offer end-to-end encryption to all users
Channel News Asia: Zoom to offer end-to-end encryption for all users
Engadget: Zoom now promises end-to-end encryption is coming for all
The Mac Observer: Zoom Backtracks, Will Give Free Users Encryption Protection
CNET: Zoom will offer full encryption to free users after all
Daily Dot: After pressure, Zoom says everyone will get end-to-end encryption
Cult of Mac: Zoom does an about-face on end-to-end encryption
Reuters: Zoom to offer end-to-end encryption for all users, trial to begin in July
AppleInsider: Zoom backtracks, says end-to-end encryption will be able to all users
Trusted Reviews: Zoom will provide end-to-end encryption to all in massive climbdown
Bleeping Computer: Zoom will provide end-to-end encryption to all users
Slashdot: Zoom To Launch End-to-End Encryption For All Users — Not Just Paid Accounts
iTnews – Security: Zoom to offer free users end-to-end encryption after all
BGR: Zoom will offer end-to-end encrypted video calls free of charge
MobileSyrup.com: Zoom to roll out end-to-end encryption for all users, not just paying ones

@CyberScoopNews: In reversal, Zoom says all users will have access to end-to-end encryption https://hubs.ly/H0rDz9H0 by @shanvav
@EFF: We applaud Zoom’s decision to make privacy and security enhancements available to all of their hundreds of millions of users.
@schneierblog: Zoom Will Be End-to-End Encrypted for All Users https://schneier.com/blog/archives/
@viaCristiano: RT @viaCristiano: Zoom announces it will offer end-to-end encryption for all users, not just paid ones
@Wired: In May, Zoom said it was building out full end-to-end encryption for video and audio calls, but that it would only be available for paying customers. Now, the company is walking that back, pledging to provide the service to any user.


September 11, 2019
Lily Hay Newman / Wired

Lily Hay Newman / Wired  
Operation reWired Results in Global Arrests of 281 Suspects in Business Email Compromise Schemes

In its biggest move to date against this kind of scam, the Justice Department announced the arrest of 281 suspects in connection with email scams and wire transfer fraud known as business email compromise. The mass effort, dubbed Operation reWired, involved extensive international coordination to make 167 arrests in Nigeria, 74 in the United States, 18 in Turkey, and 15 in Ghana, with the remaining arrests taking place in France, Italy, Japan, Kenya, Malaysia, and the United Kingdom. Numerous law enforcement agencies across the globe were involved, including, in the US alone, the DOJ, the Department of Homeland Security, the Treasury, the State Department, and the Postal Inspection Service.

Related: The Register – Security, Justice.gov, Homeland Security Today, Bleeping Computer, Data Breaches.net, TechNadu, Spyware, Austin-American Statesman, Cyberscoop, UPI.com, USATODAY, The Hill: Cybersecurity


October 18, 2018
Amanda Iacone / Bloomberg Law

Amanda Iacone / Bloomberg Law  
SEC Found Nine Publicly Traded Companies That Wired $100 Million Combined to Fraudsters Following Business Email Compromise Scams, Warns Companies to Maintain Sufficient Controls

A Securities and Exchange Commission (SEC) special investigative report into business email compromises found that nine publicly traded companies that fell victim to spoofing email scams wired nearly $100 million combined into the hands of fraudsters before vendors, banks, or law enforcement notified them. One of the companies lost more than $45 million, paid through 14 wire transfers requested by a fictitious executive over the span of several weeks. The SEC did not charge the nine companies but warned in its report that all public companies have obligations to maintain sufficient internal accounting controls and should consider cyber threats when fulfilling those obligations.

June 22, 2020
Brian Krebs / Krebs on Security

Brian Krebs / Krebs on Security  
Massive ‘BlueLeaks’ Dump of Sensitive Files From U.S. Police Departments Were Leaked Online by DDoSecrets

Hundreds of thousands of potentially sensitive files, nearly 270 gigabytes in total, from police departments across the United States were leaked online last week Distributed Denial of Secrets (DDoSecrets), an alternative to Wikileaks that publishes caches of previously secret data. The collection, dubbed “BlueLeaks,” which is searchable online, stems from a security breach at a Texas web design and hosting company that maintains several state law enforcement data-sharing portals. DDoSecrets said the BlueLeaks archive indexes “ten years of data from over 200 police departments, fusion centers, and other law enforcement training and support resources,” and that “among the hundreds of thousands of documents are police and FBI reports, bulletins, guides and more.”

Related: ZDNet, TechNadu, Reddit-hacking, Thomas Brewster – Forbes, HOTforSecurity, AndroidRookies, IT Pro, Reddit – cybersecurity, Sensors Tech Forum, SecurityWeek, TechNadu, Motherboard, Databreaches.net, Wired

Tweets:@DDoSecrets @DDoSecrets @DDoSecrets @DDoSecrets @DDoSecrets @DDoSecrets @DDoSecrets @DDoSecrets @DDoSecrets @DDoSecrets @DDoSecrets @campuscodi @iblametom @briankrebs @supportanonLA @a_greenberg

ZDNet: BlueLeaks: Data from 200 US police departments & fusion centers published online
TechNadu: Hundreds of US Police Departments Had Their Sensitive Data Leaked
Reddit-hacking: RELEASE: #BlueLeaks (269 GB) Ten years of data from over 200 police departments, fusion centers and other law enforcement training and support resources. Among the hundreds of thousands of documents are police and FBI reports, bulletins, guides and more.
Thomas Brewster – Forbes: BlueLeaks: Huge Leak Of Police Department Data Follows George Floyd Protests
HOTforSecurity: BlueLeaks: Activist Group Publishes More Than 1 Million Police and Federal Agency Documents Online
AndroidRookies: Blueleaks: Anonymous leaked 269 gigs data from 200 United States police departments on DDoSecrets
IT Pro: Activists publish 269GB of hacked US police force data | IT PRO
Reddit – cybersecurity: BlueLeaks: Data from 200 US police departments & fusion centers published online
Sensors Tech Forum: US Police Departments Data Published In BlueLeaks Collection Due To Security Breach
SecurityWeek: BlueLeaks: Data From Hundreds of Law Enforcement Organizations Leaked Online
TechNadu: Hundreds of US Police Departments Had Their Sensitive Data Leaked
Motherboard: ‘BlueLeaks’: Group Releases 270GB of Sensitive Police Documents
DataBreaches.net: ‘BlueLeaks’ Exposes Files from Hundreds of Police Departments
Wired: Hack Brief: Anonymous Stole and Leaked a Megatrove of Police Documents

@DDoSecrets: RELEASE: #BlueLeaks (269 GB) Ten years of data from over 200 police departments, fusion centers and other law enforcement training and support resources. Among the hundreds of thousands of documents are police and FBI reports, bulletins, guides and more. https://hunter.ddosecrets.com/datasets/102
@DDoSecrets: #BlueLeaks provides unique insights into law enforcement and a wide array of government activities, including thousands of documents mentioning #COVID19
@DDoSecrets: The complete 269 GB #BlueLeaks dataset can be downloaded at https://data.ddosecrets.com/file/BlueLeaks
@DDoSecrets: Some of the agencies in #BlueLeaks include: Alabama Fusion Center Austin Regional Intelligence Center Boston Regional Intelligence Center Colorado Information Analysis Center California Narcotic Officers' Association Delaware Information and Analysis Center
@DDoSecrets: FBI Houston Citizens Academy Alumni Association FBI National Academy Association Arkansas/Missouri Chapter FBI National Academy Association Michigan Chapter FBI National Academy Association of Texas Fort Worth Intelligence Exchange
@DDoSecrets: Minnesota Fusion Center Intelligence Communications Enterprise For Information Sharing and Exchange Illinois Crime Reporting and Information - Metro East Iowa Law Enforcement Academy Iowa Fusion Center Faith-Based Information Sharing and Analysis Organization
@DDoSecrets: Other agencies in #BlueLeaks include: Missouri Information Analysis Center Northern California Regional Intelligence Center Nevada Cyber Exchange New Hampshire Information and Analysis Center Northern Nevada Regional Intelligence Center North Texas Fusion Center
@DDoSecrets: Also in #BlueLeaks: Nevada Threat Analysis Center Orange County Intelligence Assessment Center South Carolina Information and Intelligence Center San Diego Crime and Intelligence Analysis Association South Dakota Fusion Center Southeast Florida Fusion Center
@DDoSecrets: Also in #BlueLeaks: Southeastern Michigan Association Chiefs of Police Infragard (San Francisco Bay Area) Texas Narcotic Officers Association Utah Statewide Information and Analysis Center Virginia Law Enforcement National Security Network Wisconsin Statewide Intelligence Center
@DDoSecrets: Some agencies with the most data in #BlueLeaks: 36 GB Missouri Information Analysis Center 19 GB Northern California Regional Intelligence Center 14 GB Joint Regional Intelligence Center 13 GB Delaware Information and Analysis Center
@DDoSecrets: More data / agency in #BlueLeaks: 9.4 GB Austin Regional Intelligence Center 6.6 GB Southeast Florida Fusion Center 5.3 GB FBI Houston Citizens Academy Alumni Association 4.9 GB Orange County Intelligence Assessment Center 2.9 GB Colorado Information Analysis Center
@campuscodi: RT @campuscodi : Many users have started scouring the #BlueLeaks files for recent BLM protest-related alerts and guides and the leaked files…
@iblametom: #BlueLeaks Blueleaks could be pretty interesting...
@briankrebs: "BlueLeaks" exposes hundreds of thousands of potentially sensitive files from police departments across the U.S. The data appears to have come from a security breach at a Houston-based company that helps states manage fusion center portals online. https://krebsonsecurity.com/2020/06/bluele
@supportanonLA: RT @supportanonLA: #BlueLeaks remember always hide your tattoos and anything indicating who you are.. they are looking. Closely. Medics are…
@a_greenberg: I interviewed @DDoSecrets cofounder Emma Best about #BlueLeaks, 269 gigs of files from 200+ law enforcement orgs, given to Best's secret-spilling group by a source aligned w/ Anonymous. Likely the most significant Anonymous operation in nearly a decade.


Sergiu Gatlan / Bleeping Computer

Sergiu Gatlan / Bleeping Computer  
Hackers Are Exploiting Google Analytics Platform to Steal Credit Card Info in Ongoing Magecart Attacks

Hackers are using Google’s servers and the Google Analytics platform to steal credit card information submitted by customers of online stores. A new method to bypass Content Security Policy (CSP) using the Google Analytics API disclosed last week by Kaspersky Lab has already been deployed in ongoing Magecart attacks designed to scrape credit card data from several dozen e-commerce sites. The new technique exploits the fact that e-commerce web sites using Google’s web analytics service for tracking visitors are whitelisting Google Analytics domains in their CSP configuration (a security standard used to block the execution of untrusted code on web apps).

Related: Securelist, AndroidRookies, Kaspersky Lab official blog, Tom’s Guide, Security Affairs

Tweets:@e_kaspersky @briankrebs


June 16, 2020
Ellen Nakashima and Craig Timberg / Washington Post

Ellen Nakashima and Craig Timberg / Washington Post  
Russian Operatives Ran Disinformation Campaign ‘Secondary Infektion’ That Covered More Than 300 Social Media Platforms for Six Years in Seven Languages

Russian operatives used online forgeries, fake blog posts, and more than 300 social media platforms in an operation dubbed Secondary Infektion designed to undermine opponents and spin disinformation about perceived enemies throughout the world, including in the United States, according to research firm Graphika. The list of targets over the years in persistent activity includes Ukraine’s government, the World Anti-Doping Agency, Kremlin critic Alexei Navalny, French President Emmanuel Macron and former U.S. secretary of state and presidential nominee Hillary Clinton. The operation was underway for six years, encompassed seven languages, and sent out 2,500 pieces of content. Graphika was unable to identify what part of Russia’s sprawling intelligence operations were responsible for the disinformation effort.

Related: Graphika, ZDNet, Forbes, Bloomberg, Wired, Forbes, The Verge, Input, Wall Street Journal

Tweets:@benimmo @Graphika_NYC @nakashimae @katestarbird @ngleicher @campuscodi @matthindman @IOpartnership @asebenius @lilyhnewman @elinormills @davidagranovich @nxthompson

Graphika: Exposing Secondary Infektion
ZDNet: Super secretive Russian disinfo operation discovered dating back to 2014
Forbes: 2,500 Posts, 300 Platforms, 6 Years: A Huge But Mysterious Pro-Russia Disinformation Campaign Is Exposed
Bloomberg: Russia-Based Influence Campaign Spanned Six Years
Wired: The Russian Disinfo Operation You Never Heard About
Forbes : 2,500 Posts, 300 Platforms, 6 Years: A Huge But Mysterious Pro-Russia Disinformation Campaign Is Exposed
The Verge: Researchers uncover six-year Russian misinformation campaign across Facebook and Reddit
Input: A Russian disinformation campaign went unnoticed on Facebook and Reddit for years
Wall Street Journal: New Report Points to How Russian Misinformation May Have Adapted Since 2016 Election 

@benimmo: BREAKING: @Graphika_NYC has been digging into Russian info op #SecondaryInfektion for months. Today, we’re exposing its full scale. 6 years 7 languages > 2,500 pieces of content > 300 platforms (no, that’s not a typo) And some truly epic fails. https://secondaryinfektion.org
@Graphika_NYC: Graphika’s latest research dives deep into #SecondaryInfektion, a 6 year campaign featuring more than 2,500 pieces of content on over 300 platforms. Explore the extensive report at http://secondaryinfektion.org
@nakashimae: Graphika is out with the most comprehensive look yet at the Russian information operation known as Secondary Infektion, which used forgeries and fake posts on 300 platforms in 7 languages. w/ @CraigTimberg
@katestarbird: One of the most interesting aspects (to me) of this report on a Russian information operation is the identification of cross-platform personas that seed content (including forgeries) on social media, online forums, and blogging websites.
@ngleicher: This is a critical assessment — influence operations are increasingly cross-platform, and target traditional media as well as online platforms. Collaboration across industry, and with civil society and government, is essential to tackle these threats.
@campuscodi: Researchers uncover six-years-worth of Russian attempts to mold international politics using fake news and forged documents -Different group from the IRA -Named Secondary Infektion -High-level OpSec, identity yet unknown
@matthindman: Amazing work by @benimmo @camillefrancois and the folks at @Graphika_NYC .
@IOpartnership: NEW: @Graphika's @bennimmo.@camillefrancois, @realShawnEib, @Lea_Ronzaud, @rp2871, @ChrisHernon, + Tim Kostelancik took a deep dive into the influence op known as Secondary Infektion and catalogued campaign's use of forged documents. Read the report Down pointing backhand index
@asebenius: In addition to the well documented disinformation campaigns by Russia's IRA and GRU, a third group operated at the same time -- using fake accounts & forged documents in an attempt to influence elections & divide critics in the West, @Graphika_NYC found.
@lilyhnewman: in addition to the IRA and GRU there's a third arm of the russian disinformation machine, Secondary Infektion, that hasn't been comprehensively examined until now. since 2014 it's been operating on more than 300 social networks, blogs, and forums worldwide
@elinormills: Group known as Secondary Infektion used multiple languages and burner accounts on 300 platforms over 6 years, @Graphika_NYC researchers found https://wsj.com/articles/russia-linked-disinformation-campaign-spread-messages-across-multiple-platforms-to-elude-detection-new-report-says-11592319829 via @bobmcmillan @WSJ
@davidagranovich: Ben and the brilliant Graphika team out w/ comprehensive assessment of the Secondary Infektion network, first disclosed in May 2019 by our team at Facebook. Key takeaways: stellar OPSEC often translates to limited reach, ops are x-platform, role of media as amplifiers is key ?
@nxthompson: News: For years, we've been talking about Russian influence operations through their IRA and GRU. Now it turns out they've had a third group--Secondary Infektion--using burner accounts to manipulate us on smaller platforms too.


June 28, 2020
gvnshtn

gvnshtn  
Maersk Insider Account Says That Lack of Standardized and Consistently Applied Privileged Access Controls Made It ‘Trivial’ for Attack to Wipe Company Out

On the third anniversary of the NotPetya cyberattack, the Identity & Access Management (IAM) Subject Matter Expert (SME), and later IAM Service Owner of hard-hit shipping giant Maersk, offers an insider viewer on the security practices leading up to the attack and the remediation and recovery practices that followed the devastating event. One of the lessons learned from the event is that Maersk “could and should have been in the process of applying consistent security policies to control accounts and access,” according to the insider account. “The lack of standardised and consistently applied privileged access controls, made it trivial for notPetya to wipe Maersk out.”

Tweets:@gvnshtn @a_greenberg @a_greenberg @dannyjpalmer @dannyjpalmer @drshellface

@gvnshtn: Maersk, me & notPetya https://gvnshtn.com/maersk-me-notpetya/ Hope this helps ? #CyberAttack #CyberSecurity #PAM #AzureAD #ActiveDirectory #Baseline #MFA #Maersk #notPetya
@a_greenberg: Three years ago today, the NotPetya worm began its $10 billion global rampage across banks, governments, hospitals, pharma, food production, and shipping: https://wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ Still the worst cyberattack in history. The Russian GRU hackers responsible are still out there.
@a_greenberg: The story of how NotPetya hit Maersk, captured in that excerpt from my book above (and more recently in this great writeup: https://gvnshtn.com/maersk-me-notpetya/) is pretty well known by now. Less so how NotPetya affected American hospitals, and the lives it endangered: https://slate.com/technology/201
@dannyjpalmer: Three years ago today, the NotPetya cyberattack caused chaos around the world. Here's my initial report on the first few hours of what initially looked like a ransomware campaign. https://zdnet.com/article/a-massive-cyberattack-is-hitting-organisations-around-the-world/ via @ZDNet
@dannyjpalmer: Developed by Russia using leaked NSA hacking tool EternalBlue, NotPetya was designed to destroy networks in Ukraine - but it span out of control causing billions in damage around the world. Maersk was one company that had to rebuild their whole network.
@drshellface: gvnshtn.com/maersk-me-notpetya/ [Great article, this phrase really struck out at me: "the fundamental risk we had failed to address was management of privileged access". All the patching in the world won't save you if everyone is Domain Admin! Principle of Least Privilege FTW.]


June 11, 2020
Jay Greene / Washington Post

Jay Greene / Washington Post  
Amazon to Pause Law Enforcement Use of Its Facial Recognition System for One Year As Nation Rages Over Police Brutality

Amazon said it would ban police use of its facial recognition software Rekognition for one year amid national protest over police brutality toward and murder of African Americans and against the backdrop of overall concern about law enforcement surveillance of citizens. “We’ve advocated that governments should put in place stronger regulations to govern the ethical use of facial recognition technology, and in recent days, Congress appears ready to take on this challenge,” the company wrote in a brief blog post.

Related: TIME, The Telegraph, EFF, VICE News, Vox, Vox, Axios, Daily Dot, The Verge, Fortune, StateScoop, Protocol, InputPolitico, Amazon, TechCrunch, Forbes, NDTV Gadgets360.com, Channel News Asia, CNET, Daily Dot, RT USA, Silicon Republic, The Next Web, WIRED

Tweets:@geoffreyfowler @alfredwkng @davegershgorn @campuscodi @zackwhittaker @iblametom @iblametom

TIME: Amazon Bans Police Use of Its Face Recognition Technology for a Year
The Telegraph: Amazon bans sales of face recognition software to police for one year
EFF: Amazon Ring Must End Its Dangerous Partnerships With Police
VICE News: Amazon Puts 1-Year Ban on Police Use of its Biased Facial Recognition Software
Vox: Members of Congress want to know more about law enforcement’s surveillance of protesters
Vox: Amazon suspends police access to its facial recognition technology. But only for one year.
Axios: Amazon to halt police use of its facial recognition technology for one year
Daily Dot: Amazon says it’s halting police use of facial recognition for 1 year
The Verge: Amazon bans police from using its facial recognition technology for the next year
Fortune: Amazon bans police from using its facial-recognition technology for a year
StateScoop: Amazon suspends police use of facial recognition software for one year
Protocol: Amazon, facing pressure, won’t provide facial recognition to police for a year
Input: Amazon has placed a one-year moratorium on police use of Rekognition
Politico: Amazon to pause police use of its facial recognition tool amid wave of protests
Amazon: We are implementing a one-year moratorium on police use of Rekognition
TechCrunch: Amazon’s facial recognition moratorium has major loopholes
Forbes: Microsoft Urged To Follow Amazon And IBM: Stop Selling Facial Recognition To Cops After George Floyd’s Death
NDTV Gadgets360.com: TikTok Faces Scrutiny From EU Watchdogs
Channel News Asia: EU watchdog sets up TikTok task force, warns on Clearview AI software
CNET: Clearview AI still backs facial recognition, despite competitors’ concerns
Daily Dot: Amazon says it’s halting police use of facial recognition for 1 year
RT USA: Amazon declares ‘moratorium’ on police use of its ‘racist’ facial recognition tech
Silicon Republic: Amazon puts one-year ban on use of facial recognition tech by police
The Next Web: Amazon is pausing its facial recognition program for police for a year — but that’s not enough
WIRED: Amazon Won’t Let Police Use Its Facial-Recognition Tech for One Year

@geoffreyfowler: Amazon bans police use of its facial-recognition tech for a year: https://wapo.st/37i2odT This is not just about bias built into Rekonition, which hasn’t been independently vetted recently. It’s also about bias in how police use the tech, which is currently largely unregulated.
@alfredwkng: Breaking: Amazon is implementing a 1 year moratorium on police using facial recognition
@davegershgorn: "We’re implementing a one-year moratorium on police use of Amazon’s facial recognition technology. "
@campuscodi: Amazon bans police use of its facial recognition software for one year https://blog.aboutamazon.com/policy/we-are-
@zackwhittaker: New: Amazon's says it'll put a moratorium on police using its controversial facial recognition tech for 1 year. But it says nothing about cutting off access to federal agencies or law enforcement. Amazon declined to comment. https://tcrn.ch/37l3u8C…
@iblametom: Huge update: Microsoft has declined to comment.
@iblametom: After Amazon and IBM moves, Microsoft is urged to ditch its gov face recognition business. Amazon Ring also told to give it a rest.


June 10, 2020
Joseph Menn / Reuters

Joseph Menn / Reuters  
U.S. Lawmakers Seek Answers From Juniper Networks on NSA Backdoor Discovered In Company’s NetScreen Software in 2015

A group of U.S. lawmakers preparing to fight a legislative attack on encrypted communications is trying to establish what happened when the NSA subverted encryption at Silicon Valley maker of networking gear Juniper Networks.  Senate Intelligence Committee member Ron Wyden (D-OR), Republican Senator Mike Lee of the Judiciary Committee and the chairmen of the House Judiciary and Homeland Security committees sent a letter to Juniper Chief Executive Rami Rahim asking what had happened to an investigation Juniper announced after it found “unauthorized code” inside its widely used NetScreen security software in 2015.  The code was later discovered to be a mechanism secretly designed by the National Security Agency and widely believed to contain a back door for spying, known as Dual Elliptic Curve.

June 9, 2020
StreetInsider.com

StreetInsider.com  
Top Analyst Suggests Apple Could Buy Privacy-Oriented Search Engine DuckDuckGo to Put Pressure on Google

Bernstein analyst Toni Sacconaghi suggested Apple may consider acquiring its own search engine to capture the lucrative advertising stream for themselves or serve as a “stalking horse” to pressure Google. The analyst believes it could buy the privacy-centric, fourth-ranked U.S. search engine, DuckDuckGo for under $1 billion, which would amount to less than a week’s worth of cash flow.