Tag Archives for " software "

Cybersecurity Firm Finds Way to Alter WhatsApp Messages

A cybersecurity company said it had discovered a flaw in WhatsApp, the Facebook-owned messaging service with 1.5 billion users, that allows scammers to alter the content or change the identity of the sender of a previously delivered message. WhatsApp, however, says it is still safe, and what Check Point Software discovered was a system operating as it was intended.

Source: Cybersecurity Firm Finds Way to Alter WhatsApp Messages – The New York Times

Use of facial-imaging software for anti-fraud measures is legal, Minister says

The use of facial imaging software by the Irish Department of Employment Affairs and Social Protection to detect potential identity fraud is “compliant with the law”, Minister for Employment Affairs and Social Protection Regina Doherty has said responding to parliamentary questions.

The Minister said the EU regulation “clarifies that the processing of certain personal data, such as photographs, should not systematically be considered as biometric data unless such personal data is processed through a specific technical means allowing the unique identification or authentication of a natural person”.

Source: Use of facial-imaging software for anti-fraud measures is legal, Minister says

Understanding Session Replay Scripts – a Guide for Privacy Professionals

Over the last few months, privacy researchers at Princeton University’s Center for Information Technology Policy (CITP) have published the results of ongoing research demonstrating that many website operators are using third-party tools called “session replay scripts” to track visitors’ individual browsing sessions, including their keystrokes and mouse movements.

These “session replay scripts,” typically used as analytics tools for publishers to better understand how visitors are navigating their websites, were found on 482 of the 50,000 most trafficked websites, including government (.gov) and educational (.edu) websites, and websites of major retailers.

Source: Understanding Session Replay Scripts – a Guide for Privacy Professionals

The Best Spyware Protection Security Software of 2018

Is someone peeking at you secretly through your laptop’s webcam? Or logging all the keys you type, including your passwords? Malware coders find all kinds of ways to spy on you—it’s creepy.

If you have antivirus protection installed, it should eliminate spyware, just as it wipes out other types of malware. But some security tools add layers of protection that actively protects against various types of spying malware. This article doesn’t focus on the best antivirus products. Instead, I’ve selected products that exemplify seven active defenses against spyware, including protection from webcam peepers and keystroke loggers.

Source: The Best Spyware Protection Security Software of 2018 | PCMag.com

Popular new transcription app Otter raises privacy red flags

Looking at everything with a hearty dose of cynicism is an occupational hazard of security reporting. Whenever a data-hungry app or service is free, there’s always a looming feeling of “what’s the catch?”

Enter the latest example: Otter, a free transcription app. It lets you record and transcribe meetings in real time. Anyone who’s transcribed knows how boring and arduous it is — and reporters, especially, hate doing it — even if it’s important to have a written record of meetings, source interviews, and other events.

Source: Popular new transcription app Otter raises privacy red flags | ZDNet

Practical Guide To GDPR For Developers

You’ve probably heard about GDPR. The new European data protection regulation that applies practically to everyone. Especially if you are working in a big company, it’s most likely that there’s already a process for getting your systems in compliance with the regulation.

The regulation is basically a law that must be followed in all European countries (but also applies to non-EU companies that have users in the EU). In this particular case, it applies to companies that are not registered in Europe, but are having European customers. So that’s most companies. I will not go into yet another “12 facts about GDPR” or “7 myths about GDPR” posts/whitepapers, as they are often aimed at managers or legal people. Instead, I’ll focus on what GDPR means for developers.

Source: GDPR – A Practical Guide For Developers – Bozho’s tech blog

How GDPR Will Change Web Development

Europe’s imminent privacy overhaul means that we all have to become more diligent about what data we collect, how we collect it, and what we do with it. In our turbulent times, these privacy obligations are about ethics as well as law.

Web developers have a major role to play here. After all, healthy data protection practice is as much about the development side — code, data, and security — as it is about the business side of process, information, and strategy.

Source: How GDPR Will Change The Way You Develop

Real-time Captcha technique improves biometric authentication

A new login authentication approach could improve the security of current biometric techniques that rely on video or images of users’ faces. Known as Real-Time Captcha, the technique uses a unique ‘challenge’ that’s easy for humans — but difficult for attackers who may be using machine learning and image generation software to spoof legitimate users.

Source: Real-time Captcha technique improves biometric authentication — ScienceDaily

A tagging approach to PIAs in agile software development 

Agile software development is a state-of-the-art methodology that speeds up development and focuses on adaptability. It is estimated that more than half of IT organizations use agile methodologies in their processes. However, for the purpose of complying with the EU General Data Protection Regulation, agile-led projects face challenges concerning privacy impact assessments and data protection impact assessments. We will expand on those challenges and analyze the use of a tagging method that relates the mandates of GDPR to elements of agile development.

Source: A tagging approach to PIAs in agile software development 

>