6 private links
Le constructeur de jouets pour enfants Vtech avait été victime d’un piratage important en 2015. Vtech a écopé cette semaine d’une amende de 650.000 dollars pour avoir négligé la sécurité de ses jouets, mais des chercheurs continuent de penser que Vtech prend la sécurité à la légère.
Environ 80% des consommateurs sont prêts à ignorer une marque si elle utilise leurs données sans autorisation. D’après une étude de SAP, les internautes sont attentifs aux données qu’ils partagent sur la Toile.
Today, Facebook AI Research (FAIR) open sourced Detectron — our state-of-the-art platform for object detection research. The Detectron project was started in July 2016 with the goal of creating a fast and flexible object detection system built on Caffe2, which was then in early alpha development. Over the last year and a half, the codebase…
Aiming for a 10 year life-cycle for smartphones
Le règne des réseaux sociaux et des jeux
Privacy experts believe tens of millions of Americans are already being monitored by automakers.
Switches commercial model for contribution to open source,Software ,Software,Open Source,Linux
system-bus-radio - Transmits AM radio on computers without radio transmitting hardware.
Windows Directory Statistics cleanup tool
altWinDirStat - An unofficial modification of WinDirStat
Lookout and Electronic Frontier Foundation (EFF) have discovered Dark Caracal, a persistent and prolific actor running a global espionage campaign against military personnel, enterprises, medical professionals, lawyers, journalists, educational institutions, and activists.
More than 1 million people downloaded a copycat WhatsApp app from the Google Play Store, according to a report from The Hacker News. The app, which is officially called Update WhatsApp Messenger, w…
Not a whole lot of new lessons to be learned from this, but basic reinforcement of old ones:
-
It's easy to get users, even high-profile at-risk users, to install arbitrary applications. Since there's little to be gained from litigating this basic fact, we have to work around it. We recommend at-risk users stick to relatively recent iPhones, not because Android phones can't be made to be asymptotically as secure, but simply because it's more difficult (technically and logistically) to set up a deployment process that gets an application installed on an iPhone that can do as much as these backdoored Android apps can.
-
The biggest threat facing users on general-purpose computers (Windows or Mac) is email attachments. The most profitable desktop infection vector here seems to have been Word macros. There's no point in litigating whether people should or shouldn't use Word documents; they're going to do that. So we have to work around that. Our recommendation is that users be trained not to view attachments on general-purpose computers by clicking on them. Two options: view attachments on iOS devices, where the viewers are less privileged and less full-featured, or always opening them using Google's office tools.
To me, the big lesson of the past few years working with non-technical users targeted by attackers is: general purpose computers simply aren't secure, and can't (for normal users) be made secure. Get people out of computer apps and onto phone or web apps.
San Francisco – The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign infecting thousands of people in more than 20 countries. Hundreds of gigabytes of data has been stolen, primarily through mobile devices compromised by fake...