Your privacy: Verizon’s takeover of Yahoo is all about user data

28 02 2017

Verizon Communications and Yahoo have come to terms on the telecom giant’s takeover of the seen-better-days Internet company. Now, millions of Yahoo users have something else to consider: Verizon’s aggressive use of customer information.

Put simply, if you think Yahoo played fast and loose with people’s privacy, wait until you see what’s in store from the new owner.

more

The content in this post was found at http://www.latimes.com/business/lazarus/la-fi-lazarus-verizon-yahoo-privacy-20170224-story.html Clicking the title link will take you to the source of the post. and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.



A Host of Biometric Privacy/Facial Recognition Bills Currently Circulating in State Legislatures

28 02 2017

proskauer new media and technology law blog

By Jeffrey Neuburger on February 23, 2017

We’ve written extensively about the numerous lawsuitsdismissals and settlements surrounding the Illinois Biometric Information Privacy Act (BIPA). The statute, generally speaking, prohibits an entity from collecting, capturing, purchasing, or otherwise obtaining a person’s “biometric identifier” or “biometric information,” unless it satisfies certain notice and consent and data retention requirements. The statute contains defined terms and limitations, and parties in ongoing suits are currently litigating what “biometric identifiers” and “biometric information” mean under the statute and whether the collection of facial templates from uploaded photographs using sophisticated facial recognition technology fits within the ambit of the statute. Moreover, in two instances in the past six months, a district court has dismissed a lawsuit alleging procedural and technical violations of the Illinois biometric privacy statute for lack of Article III standing.

Thus, the epicenter of biometric privacy compliance and litigation has been the Illinois statute. A Texas biometric statute offers similar protections, but does not contain a private right of action.

The biometrics landscape may be about to get more complicated. An amendment has been proposed to the Illinois biometric privacy, and a number of biometric privacy bills mostly resembling BIPA have been introduced in other state legislatures. While most of the new proposed statutes are roughly consistent with the Illinois statute, as noted below, the Washington state proposal is, in many ways, very different. If any or all of these bills are enacted, they will further shape and define the legal landscape for biometrics.

more

The content in this post was found at http://newmedialaw.proskauer.com/2017/02/23/1445/ Clicking the title link will take you to the source of the post. and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.



Amazon refusing to hand over data on whether Alexa overheard a murder

28 02 2017

 –  2/23/2017,

ars technica

Amazon is balking at a search warrant seeking cloud-stored data from its Alexa Voice Service. Arkansas authorities want to examine the recorded voice and transcription data as part of a murder investigation. Among other things, the Seattle company claims that the recorded data from an Amazon Echo near a murder scene is protected by the First Amendment, as are the responses from the voice assistant itself.

more

The content in this post was found at https://arstechnica.com/tech-policy/2017/02/amazon-wont-disclose-if-alexa-witnessed-a-murder/ Clicking the title link will take you to the source of the post. and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.



No, feds can’t nab all Apple devices and try everyone’s fingerprints

28 02 2017

 –  2/23/2017, 

ars technica

A federal magistrate judge in Chicago recently denied the government’s attempt to force people in a particular building to depress their fingerprints in an attempt to open any seized Apple devices as part of a child pornography investigation.

more

The content in this post was found at https://arstechnica.com/tech-policy/2017/02/judge-no-feds-cant-nab-all-apple-devices-and-try-everyones-fingerprints/ Clicking the title link will take you to the source of the post. and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

 



Serious Cloudflare bug exposed a potpourri of secret customer data

28 02 2017
Cloudflare, a service that helps optimize the security and performance of more than 5.5 million websites, warned customers today that a recently fixed software bug exposed a range of sensitive information that could have included passwords, and cookies and tokens used to authenticate users.

A combination of factors made the bug particularly severe. First, the leakage may have been active since September 22, nearly five months before it was discovered, although the greatest period of impact was from February 13 and February 18. Second, some of the highly sensitive data that was leaked was cached by Google and other search engines. The result was that for the entire time the bug was active, hackers had the ability to access the data in real-time, by making Web requests to affected websites, and to access some of the leaked data later by crafting queries on search engines.

 

more

The content in this post was found at https://arstechnica.com/security/2017/02/serious-cloudflare-bug-exposed-a-potpourri-of-secret-customer-data/ and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post. and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

Powered by WPeMatico



Creepy IoT teddy bear leaks >2 million parents’ and kids’ voice messages

28 02 2017
A maker of Internet-connected stuffed animal toys has exposed more than 2 million voice recordings of children and parents, as well as e-mail addresses and password data for more than 800,000 accounts.

The account data was left in a publicly available database that wasn’t protected by a password or placed behind a firewall, according to a blog post published Monday by Troy Hunt, maintainter of the Have I Been Pwned?, breach-notification website. He said searches using the Shodan computer search engine and other evidence indicated that, since December 25 and January 8, the customer data was accessed multiple times by multiple parties, including criminals who ultimately held the data for ransom. The recordings were available on an Amazon-hosted service that required no authorization to access.

The data was exposed by Spiral Toys, maker of the CloudPets line of stuffed animals. The toys record and play voice messages that can be sent over the Internet by parents and children. The MongoDB database of 821,296 account records was stored by a Romanian company called mReady, which Spiral Toys appears to have contracted with. Hunt said that, on at least four occasions, people attempted to notify the toy maker of the breach. In any event, evidence left behind by the ransom demanders made it almost certain company officials knew of the intrusions.

more

The content in this post was found at https://arstechnica.com/security/2017/02/creepy-iot-teddy-bear-leaks-2-million-parents-and-kids-voice-messages/ and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

Powered by WPeMatico



FCC Chairman Goes After His Predecessor’s Internet Privacy Rules

28 02 2017

FCC Chairman Goes After His Predecessor’s Internet Privacy Rules

2/24/2017

Alina Slyukh

NPR

more

    Chairman Ajit Pai, the Republican chairman of the Federal Communications Commission (and known opponent of net neutrality), has ordered others at the FCC to hold on the employment of certain aspects of new privacy rules meant to go into effect in the coming week. These rules mandate informing customers of Internet Service Providers’ collection and usage of their data.

The content in this post was found at http://www.npr.org/sections/thetwo-way/2017/02/24/517050966/fcc-chairman-goes-after-his-predecessors-internet-privacy-rules and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

Powered by WPeMatico



CPS Privacy Breach Bared Confidential Student Information

28 02 2017

CPS Privacy Breach Bared Confidential Student Information

2/25/2017

Lauren FitzPAtrick

Chicago Sun-Times

more: http://chicago.suntimes.com/news/cps-privacy-breach-bared-confidential-student-information/

The content in this post was found at http://chicago.suntimes.com/news/cps-privacy-breach-bared-confidential-student-information/ and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

Powered by WPeMatico



Yahoo reveals more breachiness to users victimized by forged cookies

20 02 2017
Yahoo has sent out another round of notifications to users, warning some that their accounts may have been breached as recently as last year. The accounts were affected by a flaw in Yahoo’s mail service that allowed an attacker—most likely a “state actor,” according to Yahoo—to use a forged “cookie” created by software stolen from within Yahoo’s internal systems to gain access to user accounts without a password.

 

more

The content in this post was found at https://arstechnica.com/information-technology/2017/02/yahoo-reveals-more-breachiness-to-users-victimized-by-forged-cookies/ and was not authored by the moderators of privacynnewmedia.com. Clicking the title link will take you to the source of the post.

Powered by WPeMatico



Researchers discover security problems under the hood of automobile apps

20 02 2017
In a presentation at this week’s RSA security conference in San Francisco, researchers from Kaspersky Labs revealed more bad news for the Internet of drivable things—connected cars. Malware researchers Victor Chebyshev and Mikhail Kuzin examined seven Android apps for connected vehicles and found that the apps were ripe for malicious exploitation. Six of the applications had unencrypted user credentials, and all of them had little in the way of protection against reverse-engineering or the insertion of malware into apps.

more

The content in this post was found at https://arstechnica.com/security/2017/02/android-connected-car-apps-could-give-up-the-keys-to-criminals/ and was not authored by the moderators of privacynnewmediayou.com. Clicking the title link will take you to the source of the post.

Powered by WPeMatico