×
Microsoft

Lumia Phones Leaking Private Data To Microsoft 110

New submitter Albietta writes "Two independent sources inside Nokia have confirmed that Nokia Lumia phones send private information to Nokia and Microsoft servers around the world. Location data, SMS-messages and browser identification is uploaded. The Nokia leadership has known about the privacy violation since 2011 when the Lumia phones were introduced. In spring 2013, after suspicions of leaks and during the negotiations for selling off the mobile phone branch to Microsoft, the Finnish state communications department sent an inquiry to Nokia regarding leaking of private data, asking Nokia to assure that users' private data is not leaked. Nokia did not want to (or could not) provide an assurance due to the delicate business negotiations. After two more inquiries with narrower demands, Nokia assured that the phone, excluding third-party software such as the operating system, did not violate Finnish privacy laws. Microsoft is apparently also following Lumia user accounts. On one occasion a parent's Lumia account was closed without warning when they uploaded pictures from the phone displaying their kids playing naked on the beach at their summer cottage."
Crime

Indian Hustle: How Fraudsters Prey On Would-be US Tech Workers 124

New submitter angel115 points out this article on the widespread fraud committed in India against many thousands of those seeking visas to work in the U.S. Many Indian techies rely on the services of visa brokers (or people who claim to be), and end up burned by the transaction. From the article: "Some are lucky enough to get a visa — only to find that the promised job in the US doesn’t materialize. Then the visa holders are forced to return to India after spending thousands of dollars just surviving. ... No official figures are available for the number of frauds in India, but an unclassified document released by Wikileaks showed that in 2009, US consular officials cited H-1B scams as one of the two most common fraud categories in India." Another interesting detail: As part of a U.S. government investigation, "Officers investigated 150 companies in the city and discovered that 77 percent 'turned out to be fraudulent or highly suspect.' ... Officials uncovered a scheme where Hyderabadis were claiming to work for made-up companies in Pune so the Mumbai consulate would be less suspicious about their applications. 'The Hyderabadis claimed that they had opened shell companies in Bangalore because "everyone knows Hyderabad has fraud and Bangalore is reputable,” according to the internal communiqué [later published by Wikileaks]."
Crime

Slashdot Asks: Do You Label Your Tech Gear, and If So, How? 250

At last month's CES, I mislaid a microphone that I'd just bought: too many items in little black pouches, and that one disappeared on a patch of dark carpet when I got something else out of my bag. A few minutes later, when I realized this, I walked back to find (no shocker) that it had walked away, and the lost mic somehow never made it to the Lost & Found office. Dumb as I felt for having let it get away, the real sting is knowing that I didn't so much as have my name on it, which I like to think might have nudged a morally ambivalent finder into returning it. My question is this: How do you personalize, label, or mark your expensive tech goodies, so it's harder for them to be innocently or less-innocently taken away? Even at a LAN party, it's easy for items to get swapped around and confused. I've sometimes put my name or initials (in permanent ink) on any flat surface I can find that will fit it, but even the "permanent" ink of Sharpies seems to fade on many surfaces. Stickers degrade with heat, time, and bag jostling, but they certainly help. Is engraving the best permanent option? Have you used one of the physical tag services, like Boomerang, and has that ever actually come in handy for you? There's theft-deterrent (or at least post-theft tracking) software, as we've mentioned a few times on Slashdot, but many things aren't suited to it, like my lost mic. What do you do to keep your stuff yours?
Microsoft

"Microsoft Killed My Pappy" 742

theodp writes "A conversation with an angry young developer prompts Microsoft Program Manager Scott Hanselman to blog about 'Microsoft Haters: The Next Generation.' 'The ones I find the most interesting,' says Hanselman, are the 'Microsoft killed my Pappy' people, angry with generational anger. My elders hated Microsoft so I hate them. Why? Because, you wronged me.' The U.S. and Japan managed to get over the whole World War II thing, Hanselman notes, so why can't people manage to get past the Microsoft antitrust thing, which was initiated in 1998 for actions in 1994? 'At some point you let go,' he suggests, 'and you start again with fresh eyes.' Despite the overall good-humored, why-can't-we-get-along tone of his post, Hanselman can't resist one dig that seems aimed at putting things into perspective for those who would still Slashdot like it's 1999: 'I wonder if I can swap out Chrome from Chrome OS or Mobile Safari in iOS.'"
Censorship

Internet Shutdown Adds To Venezuela's Woes 194

Slashgear reports that many state-run internet links in Venezuela have been shut down by that country's government, as censorship efforts there step up along with widespread turmoil, partly in the form of widespread anti-government protests. The article begins: "Don’t expect one whole heck of a lot of tweets coming out of Venezuela in the immediate future as President Nicolas Maduro’s government has shut down the internet and select TV channels. Having shut down Twitter access for the area this past week, Venezuela’s state-run ISP CANTV has been cut in areas such as San Cristobal. This area is a regional capital in the west of the country and CANTV controls the vast majority of internet connectivity in the area. The Electronic Frontier Foundation made note that Venezuelans working with several different ISPs lost all connectivity on Thursday of this past week. Users lost connectivity to the major content delivery network Edgecast and the IP address which provides access to Twitter’s image hosting service while another block stopped Venezuelan access to the text-based site Pastebin."
Privacy

Microsoft Lync Server Gathers Employee Data Just Like NSA 207

coondoggie writes "Microsoft's Lync communications platform gathers enough readily analyzable data to let corporations spy on their employees like the NSA can on U.S. citizens, and it's based on the same type of information — call details. At Microsoft's Lync 2014 conference, software developer Event Zero detailed just how easy it would be, for instance, to figure out who is dating whom within the company and pinpoint people looking for another job."
Education

All In All, Kids Just Another Brick In the Data Wall 110

theodp writes "If you don't have kids of school age, you may not be aware that Data Walls — typically a low-tech "dashboard" of color-coded sticky notes on a wall bearing the names of pupils to highlight their achievement level, absences, or discipline problems — are apparently quite the rage. This is much to the chagrin of some teachers, including Peter A. Greene, who rails against the walls-of-shame in Up Against the Data Wall. Why stop there, Greene asks, tongue-in-cheek. Why not have data-driven dress codes? Data-driven recess? Pooh-poohing concerns of teachers who think Data Walls are mean but feel pressure to create them, the Supt. of Holyoke Public Schools said, "It's not a mandate whatsoever." Still, he went on to add, "I would say 99 percent of teachers see the benefit of it," which some might take as an implicit mandate. In other student privacy news, New York's Supreme Court has ruled that parental permission is not required to disclose student data to the Bill and Melinda Gates Foundation-funded inBloom, perhaps paving the way for the Great Data Wall of the U.S."
Communications

Steve Jobs To Appear On US Postage Stamp 184

Hugh Pickens DOT Com writes "Steven Musil writes at Cnet that the US Postal Service hopes Steve Jobs can do for it what he once did for Apple as the late Apple co-founder will be featured on a commemorative US postage stamp along with Johnny Carson, Ingrid Bergman, Elvis Presley, and James Brown. The former Apple CEO's stamp is still in the design stages and will be released at some point in 2015. Jobs, who passed away in 2011 after a battle with pancreatic cancer, has also been posthumously honored for his visionary achievements with a special Grammy Merit Award and a Disney Legends Award. Jobs was also inducted into the Bay Area Business Hall of Fame, has had a building at Pixar named after him, and was featured in an exhibit at the US Patent Office Museum. "The profitable first class mail business has been decimated by email over the past decade, thanks in no small part to the contributions of Steve Jobs and Apple," writes Derek Kessler. "It's no small feat to be so impactful that the USPS feels compelled to honor you despite the fact that the work that you've done is dismantling the core of their business.""
Privacy

Why Is Dropbox Back On the Chinese Market? 46

Nerval's Lobster writes "Dropbox has renewed access to the Chinese market for the first time in four years. But why? The Chinese government first blocked access to Dropbox in 2010, most likely to prevent people within China from sharing data via the cloud. Now Dropbox is back online in China, albeit at slower speeds. Despite repeated queries from Slashdot, however, Dropbox has declined to comment on why China may have dropped the in-country restrictions to its services. "We still have nothing to share," the company responded after the third email. Dropbox isn't the only foreign cloud service available on the Chinese market (although Google Drive remains blocked): in late 2013, Amazon announced it would open an Amazon Web Services (AWS) region in the country; at the time, the Amazon Web Services Blog alluded to the "legal and regulatory requirements" that this new AWS region will obey. So questions remain: Did Dropbox know it would regain entry to the Chinese market? If so, did it need to agree to certain conditions before the Chinese government would "flip the switch," as it were?"
The Courts

Canadian Court Tries to Dampen Copyright Trolls In P2P Lawsuits 60

An anonymous reader writes "The Canadian federal court has released its much-anticipated decision in Voltage Pictures v. Does, a case involving demands that TekSavvy, a leading independent ISP, disclose the identities of roughly 2,000 subscribers alleged to have downloaded movies without authorization. Michael Geist notes that the court was sensitive to the copyright troll concern, noting that 'given the issues in play the answers require a delicate balancing of privacy rights versus the rights of copyright holders. This is especially so in the context of modern day technology and users of the Internet.' In order to strike the balance, the court required full court approval of the content of any demand letters and bold warnings that no court had found a recipient liable for any damages."
Bug

Stack Overflow Could Explain Toyota Vehicles' Unintended Acceleration 664

New submitter robertchin writes "Michael Barr recently testified in the Bookout v. Toyota Motor Corp lawsuit that the likely cause of unintentional acceleration in the Toyota Camry may have been caused by a stack overflow. Due to recursion overwriting critical data past the end of the stack and into the real time operating system memory area, the throttle was left in an open state and the process that controlled the throttle was terminated. How can users protect themselves from sometimes life endangering software bugs?"
Privacy

We Can Avoid a Surveillance State Dystopia 267

An anonymous reader writes "After the past year's revelations about NSA spying, it's hard to read any commentary about society without dire warnings of the coming (or already present) surveillance state. Sci-fi author Ramez Naam makes the point that while government surveillance needs to be fought, it's actually not as bad as what we were promised in decades past. 'Aldous Huxley published Brave New World in 1932. And while Brave New World is remembered more for predicting government-controlled biological engineering of the masses, it also features government surveillance, media manipulation, and thought control. This is an old idea. Yet somehow, today, in most of the world, governments have dramatically less control over their people than they did when Huxley and Orwell wrote those words. Indeed, the average person on Earth is more free today, in 2014, than he or she would have been in the actual year 1984. The arc of history has bent towards more freedom.' Naam also explains that the technological advances allowing the bulk collection of personal data also provide us with cheap and easy means to fight government overreach."
Privacy

Schneier: Break Up the NSA 324

New submitter BrianPRabbit writes "Bruce Schneier proposes 'breaking up' the NSA. He suggests assigning the targeted hardware/software surveillance of enemy operations to U.S. Cyber Command. Further, the NSA's surveillance of Americans needs to be scaled back and placed under the control of the FBI. Finally, he says, is 'the deliberate sabotaging of security. The primary example we have of this is the NSA's BULLRUN program, which tries to "insert vulnerabilities into commercial encryption systems, IT systems, networks and endpoint communication devices." This is the worst of the NSA's excesses, because it destroys our trust in the Internet, weakens the security all of us rely on and makes us more vulnerable to attackers worldwide. .... [T]he remainder of the NSA needs to be rebalanced so COMSEC (communications security) has priority over SIGINT (signals intelligence). Instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.'"
Patents

White House Takes Steps Against Patent Trolls 97

itwbennett writes "The Obama administration on Thursday launched a website with information to assist people and businesses targeted in patent lawsuits or receiving patent demand letters. The White House also announced that it would launch a new crowdsourcing initiative focused on identifying prior art (evidence of existing inventions) that the USPTO can use to reject bad patent claims and will expand a USPTO patent examiner technical training program by allowing outside technologists to help with the training."
Software

Why Your Online Impersonation of a 16-year Old Girl Won't Last Long 137

An anonymous reader writes "Can computers pick up your age and gender from your tweets? If you want to give it a try, here's your chance: 'To develop your software for age and gender identification, we provide you with a training data set that consists of blog posts, Twitter tweets, social media texts, as well as hotel reviews.' Well, at least my paid Amazon reviews are safe for the time being..."
Privacy

Major Vulnerability In Tinder Dating App Allowed User Tracking 23

An anonymous reader writes "Include Security unveiled new research showing that users of the popular online dating app Tinder were at significant risk due to a vulnerability they discovered in the geo-location feature of the application. This vulnerability allowed Tinder users to track each another's exact location for much of 2013. Anyone with rudimentary programming skills could query the Tinder API directly and pull down the co-ordinates of any user. This resulted in a privacy violation for the users of the application." Include Security has posted a video that shows how the the flaw could be exploited, before it was fixed last month.
United States

ICE License-Plate Tracking Plan Withdrawn Amid Outcry About Privacy 152

An anonymous reader writes "Homeland security officials on Wednesday abruptly shelved a proposal to build a national database of license-plate scans after criticism from privacy advocates. The proposal, which had been posted online last week by the office of Immigration and Customs Enforcement, sought a contractor who could establish a searchable database of license plates, with the times and locations where they were spotted by traffic cameras and other sources. But in a statement late Wednesday, the department announced a reversal. 'The solicitation, which was posted without the awareness of ICE leadership, has been canceled,' said spokeswoman Gillian Christensen. 'While we continue to support a range of technologies to help meet our law enforcement mission, this solicitation will be reviewed to ensure the path forward appropriately meets our operational needs.'"
Privacy

EFF Reports GHCQ and NSA Keeping Tabs On Wikileaks Visitors and Reporters 82

sandbagger writes in with a story about U.S. and British government interest and involvement with journalists visiting the Wikileaks website. "The Intercept recently published an article and supporting documents indicating that the NSA and its British counterpart GCHQ surveilled and even sought to have other countries prosecute the investigative journalism website WikiLeaks. GCHQ also surveilled the millions of people who merely read the WikiLeaks website. The article clarifies the lengths that these two spy organizations go to track their targets and confirms, once again, that they do not confine themselves to spying on to those accused of terrorism. One document contains a summary of an internal discussion in which officials from two NSA offices discuss whether to categorize WikiLeaks as a "malicious foreign actor" for surveillance targeting purposes. This would be an important categorization because agents have significantly more authority to engage in surveillance of malicious foreign actors."
Government

FCC Planning Rule Changes To Restore US Net Neutrality 235

Karl C writes "In a statement issued today, FCC commissioner Tom Wheeler announced that the commission will begin a rule-making process to re-impose Net Neutrality, which was recently struck down in Federal court. Among the standards Wheeler intends to pursue are vigorous enforcement of a requirement for transparency in how ISPs manage traffic, and a prohibition on blocking (the 'no blocking' provision.) This seems like exactly what net neutrality activists have been demanding: Total prohibition of throttling, and vigorous enforcement of that rule, and of a transparency requirements so ISPs can't try to mealy-mouth their way around accusations that they're already throttling Netflix. Even before the court decision overturning net neutrality, Comcast and Verizon users have been noting Netflix slowdowns for months."
AT&T

Government Sent 2,000+ National Security Letters To AT&T In 2013 67

Trailrunner7 writes: "AT&T, in its first transparency report, said it received at least 2,000 National Security Letters and nearly 38,000 requests for location data on its subscribers in 2013. The new report from AT&T is the latest in a growing list of publications from telecom companies, Web providers and cell phone carriers who have been under pressure from privacy advocates and security experts in the wake of the Edward Snowden NSA surveillance revelations. AT&T's report shows a higher number of NSLs and subpoenas in 2013 than its most relevant competitor, Verizon. In January, Verizon's first transparency report showed that the company received between 1,000 and 1,999 NSLs in 2013 and 164,000 subpoenas. AT&T said it got 2,000-2,999 NSLs and 248,343 subpoenas last year. AT&T also received nearly 37,000 court orders and more than 16,000 search warrants."

Slashdot Top Deals