Security News
Generative AI is going to be a powerful tool for data analysis and summarization. Here's an example of it being used for sentiment analysis.
Australian retailers are rolling out mass surveillance solutions to combat shoplifting, but a poor regulatory environment could mean high risks associated with data security and privacy. "Once you start using CCTV or any sort of imaging, they've got the raw data from which various biometric mechanisms might be applied," said Chair of the Australian Privacy Foundation David Vaile.
About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I've been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998.
Successful camera surveillance deployments require a delicate interplay between the security cameras, sensors and other hardware, the video management system, and the network itself. Surveillance installations tend to grow over time, and as the number of cameras increases, the bandwidth limit of the network is reached.
Typically, Automatic License Plate Recognition technology is used to search for plates linked to specific crimes. In this case it was used to examine the driving patterns of anyone passing one of Westchester County's 480 cameras over a two-year period.
The overarching mission of the US-based non-profit organization the Tor Project is to advance human rights and make open-source, privacy preserving software available to people globally, so that they can browse the internet privately, protect themselves against surveillance and bypass online censorship. To infosec professionals The Tor Project doesn't need an introduction, but there's always other people out there who have never heard of it.
Apple has warned that it would rather stop offering iMessage and FaceTime services in the U.K. than bowing down to government pressure in response to new proposals that seek to expand digital surveillance powers available to state intelligence agencies. Specifically, the Online Safety Bill requires companies to install technology to scan for child sex exploitation and abuse material and terrorism content in encrypted messaging apps and other services.
DUCK. Yes, the usual large number of bugs fixed. Although Elevation of Privilege usually gets looked down on as lesser than Remote Code Execution, where crooks use the bug to break in in the first place, the problem with EoP has to do with crooks who are already "Loitering with intent" in your network.
While security cameras are commonplace in American cities, self-driving cars represent a new level of access for law enforcement and a new method for encroachment on privacy, advocates say. Crisscrossing the city on their routes, self-driving cars capture a wider swath of footage.
The UK government will set a deadline for removing made-in-China surveillance cameras from "Sensitive sites." News of the not-very-imminent deadline came with on Tuesday with the publication of proposed amendments [PDF] to the Procurement Bill - legislation that will reform many aspects of the UK government's practices for buying stuff.