Category: Security & Privacy

  • Smart TV Security

    So, this is the future of security with smart devices.

    Samsung has confirmed that its “smart TV” sets are listening to customers’ every word, and the company is warning customers not to speak about personal information while near the TV sets. The company revealed that the voice activation feature on its smart TVs will capture all nearby conversations. The TV sets can share the information, including sensitive data, with Samsung as well as third-party services. The news comes after Shane Harris at The Daily Beast pointed out a troubling line in Samsung’s privacy policy: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.” Samsung has now issued a new statement clarifying how the voice activation feature works. “If a consumer consents and uses the voice recognition feature, voice data is provided to a third party during a requested voice command search,” Samsung said in a statement. “At that time, the voice data is sent to a server, which searches for the requested content then returns the desired content to the TV.” The company added that it does not retain or sell the voice data, but it didn’t name the third party that translates users’ speech. Update, Feb. 10: Samsung has updated its policy and named the third party in question, Nuance Communications, Inc. Meghan DeMaria

    via: Samsung warns customers not to discuss personal information in front of smart TVs

  • Internet Archive: The Malware Museum

     The Internet Archive now has a collection of malware that was distributed in the 1980s and 1990s on home computers and early PCs.

    Through the javascript post of DosBox (EM-DosBox) you can even execute the viruses and watch their message in your browser.

    via: The Malware Museum : Internet Archive

  • Docker 1.10

    Docker announced version 1.10 past week. The new release contains more than 100 improvements over the previous version. New features include better resource management, a more flexible docker-compose file format and improvements to security. These are in particular through user namespace isolation, implementation of seccomp for syscall filtering and an authorization plugin to restrict access to Docker engine features.

    We’re pleased to announce Docker 1.10, jam-packed with stuff you’ve been asking for. It’s now much easier to define and run complex distributed apps with Docker Compose. The power that Compose brou…

    via: Docker Blog
    Release notes.

  • Passweird 

    Correct Horse Battery Staple. But in gross. With Passweird.

    Passweird – Passwords too Gross to Steal

    Quelle: Passweird – Passwords too Gross to Steal

  • State of Internet of things security

    Forrester, well known for their predictions on the impact of technology, took a look at the state of Internet of Things Security. To no surprise they came to the conclusion the technology still has to come a long way.

     

    Forrester’s take on the Internet of things isn’t that shocking–the industry has developed with little thought about security–but the time frames are jarring nonetheless.

    Quelle:  ZDNet

  • Internet of Things security

    Security on the Internet of things has often been said to be bad. Apparently Shodan runs a search engine for sleeping kids. Through kids monitor cams available to watch. Publicly on the internet. Enough proof the Internet of Things really needs security. 

    Shodan search engine is only the latest reminder of why we need to fix IoT security.

    Quelle: Internet of Things security is so bad, there’s a search engine for sleeping kids | Ars Technica

  • Americans are actually starting to pay with their phones

    Americans are actually starting to pay with their phones

    Something that is not yet imaginable in Europe, that has not even adopted Credit Cards in large areas.

    via: Americans are actually starting to pay with their phones

  • Wireshark 2.0 Released, UI Rewritten In Qt5

    After 2 years of development, Wireshark 2.0 Released, UI Rewritten In Qt5 – writes Phoronix

  • Attribution

    While visiting the “Techdays Munich: Cyber Security“, the hashtag #6wordcyber was trending on Twitter. And during the talk about a new security law, the following tweet caught my eye:

    https://twitter.com/Orph30/status/656105774322700288

    It is well known in the security community that attribution is hard. Attacks do usually not leave enough evidence to attribute it to a specific group. However, the one reason it really made me think is, because the talk I was listening to was very explicitly avoiding attribution. Which makes any risk to prepare for – and spend money and ressources on – very diffuse and therefore difficult to evaluate for probability.

    If a product can safe you from a thread that cannot be identified or quantified, this lacking relationship makes the statement FUD, Fear, Uncertainty and Doubt.