Taiwan's National Security Bureau (NSB) official Ko Cheng-heng said that Beijing’s campaign against Taiwan would spark a strong backlash from democracies around the world....
According to the European consumer protection group BEUC, the Chinese online retailer Temu "fails to provide sufficient traceability of the traders that sell on its platform" and thereby fail "to ensure that the products sold to EU consumers conform to EU law", BEUC said in a release....
The authors introduce and evaluate an open-source software package and methodological framework for detecting and analysing coordinated behaviour on social media, namely the Coordination Network Toolkit, utilising weighted, directed multigraphs to capture intricate coordination dynamics....
Apple's grudging accommodation of European antitrust rules by allowing third-party app stores on iPhones has left users of its Safari browser exposed to potential web activity tracking....
Generative artificial intelligence (GenAI) company Anthropic has claimed to a US court that using copyrighted content in large language model (LLM) training data counts as “fair use”, however....
TL;DR - Anthropic had a data leak due to a contractor’s mistake, but says no sensitive info was exposed. It wasn’t a system breach, and there’s no sign of malicious intent.
Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make...
The article doesn't say which classifier algorithm they use in that case in India.
We had a similar incident in the Netherlands last year, for example, with similar problems. There they used Gradient Boosting afaik. But it doesn't really matter as all these algorithms will yield a high number of false positives. If we use this and blindly trust trust the result in sensitive areas such as social welfare, we cause a lot if harm to iur society.
Human Rights Watch interviewed dozens of LGBT people who indicated that they had reported being harassed, doxxed, outed, and abused on Facebook and Instagram, but in all these cases, Meta either did not respond to their complaints or found that the content they reported did not violate its policies, and the content remained...
Chinese state institutions issue rewards for finding the cybersecurity vulnerabilities in software that is often used by foreign governments, in what may be a subtle new form of state-backed cyber warfare. At the same time, China is promoting young cybersecurity engineers in a doubling of its efforts to probe foreign systems for...
Streaming platforms allow users to add upcoming tracks to their playlists, in order to listen to them as soon as they are released. While this sounds harmless, it changed the habits of independent musicians, who feel they have to adapt to yet another algorithm.
While social media firms have long faced scrutiny from Congress and civil rights organizations over their impact on young users, the new wave of lawsuits underscores how parents are increasingly leading the charge, said Jim Steyer, an attorney and founder of Common Sense media, a non-profit that advocates for children’s online...
A Chinese tech firm, Beijing-based Wangshendongjian Technology, was able to compromise AirDrop to identify users on the Beijing subway accused of sharing “inappropriate information,” judicial authorities in Beijing said this week....
eBay's harassment campaign against the couple, David and Ina Steiner, stretched for 18 days in August 2019 and was led by the company's former senior director of safety and security, Jim Baugh. It started when then-CEO Devin Wenig and then-chief communications officer Steven Wymer decided to "take down" the Steiners after...
Bryant Walker Smith, a University of South Carolina law professor, called the judge’s summary of the evidence significant because it suggests “alarming inconsistencies” between what Tesla knew internally, and what it was saying in its marketing....
An investigation by the media organization The Markup found the pixel by Facebook and Instagram-parent Meta on dozens of popular websites targeting kids from kindergarten to college, including sites that students are all but required to use if they want to participate in school activities or apply to college....
Google fought to keep the Spotify numbers private during its antitrust fight with Epic, saying they could damage negotiations with other app developers who might want more generous rates. Google’s User Choice Billing program, launched in 2022, is typically described as shaving about 4 percent off Google’s Play Store...
<a href="">YouTube Says New 5-Second Video Load Delay Is Supposed to Punish Ad Blockers, Not Firefox Users</a>
Firefox users are reporting an ‘artificial’ load time on YouTube videos. YouTube says it’s part of a plan to make people who use adblockers “experience suboptimal viewing, regardless of the browser they are using.”
The new excerpts unveiled Thursday allege executives at the e-commerce giant intentionally deleted communication by using a feature on the popular app Signal that makes messages disappear. By doing this, the FTC said Amazon “destroyed more than two years” worth of communications from June 2019 to “at least early 2022”...
A new malvertising campaign is targeting corporate users who are downloading the popular web conferencing software Webex. Threat actors have bought an advert that has been online for almost a week and that impersonates Cisco’s brand and is displayed first when performing a Google search. The malware being used in this campaign...
There is a possible way for a general purpose NFC reader to read the full card number and expiry details when the device is in locked screen mode due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation....
Last week, while checking the device of an individual employed by a Washington DC-based civil society organization with international offices, Citizen Lab found an actively exploited zero-click vulnerability being used to deliver NSO Group’s Pegasus mercenary spyware. This latest find shows once again that civil society is...
Researchers from several institutes worldwide recently developed Quarks, a new, decentralized messaging network based on blockchain technology. Their proposed system could overcome the limitations of most commonly used messaging platforms, allowing users to retain control over their personal data and other information they share...
You’re right. A blockchain doesn’t solve the double-spending problem, so don’t create decentralized payment networks. Let’s use something like Paypal instead, you know, the one that will sooner or later merge with this single-letter company.
You can also use Google Pay or Apple Pay, and developers can use their stores to monetize their apps. Just 30% or so commission and the apps ‘adjusted’ to the stores’ rules (to be fair, there are not really soooo many trackers, right?).
Proof of provenance isn’t a use case either. Use Amazon servers. Microsoft Azure. They store all the data, and it’s safe.
We don’t need companies like drife.io or particl.io. We have Uber and Amazon. Centralized services are much better. They are so good for humanity that their companies don’t even have to pay taxes.
Despite assurances for years that Hikvision has stopped minority analytics, just 7 months ago local PRC authorities awarded a $6 million contract that explicitly requires Hikvision analytics to identify Uyghurs (维族), powered by NVIDIA hardware, security specialist IPVM says.
The tech giant is evaluating tools that would use artificial intelligence to perform tasks that some of its researchers have said should be avoided....
Chinese social media companies remove posts ‘showing off wealth and worshipping money’ while the gap between the country's rich and poor widens ( www.theguardian.com )
Targeting posts boasting of personal wealth appears to be part of campaign to ‘purify the internet cultural environment’....
'Hong Kongization?’ - Chinese cyberattacks and disinformation campaigns against Taiwan surge, security agency says ( www.taipeitimes.com )
Taiwan's National Security Bureau (NSB) official Ko Cheng-heng said that Beijing’s campaign against Taiwan would spark a strong backlash from democracies around the world....
Several European consumer watchdogs file complaints against Chinese online platform Temu over "manipulative techniques" breaching EU’s Digital Services Act ( www.beuc.eu )
According to the European consumer protection group BEUC, the Chinese online retailer Temu "fails to provide sufficient traceability of the traders that sell on its platform" and thereby fail "to ensure that the products sold to EU consumers conform to EU law", BEUC said in a release....
The coordination network toolkit: a framework for detecting and analysing coordinated behaviour on social media ( link.springer.com )
The authors introduce and evaluate an open-source software package and methodological framework for detecting and analysing coordinated behaviour on social media, namely the Coordination Network Toolkit, utilising weighted, directed multigraphs to capture intricate coordination dynamics....
Russia-linked network uses AI to mass-produce misinformation, modifying content from legitimate sources and tailoring political messages with specific biases, security researchers say ( www.recordedfuture.com )
Archived version...
China's commercial tech companies define Beijing's propaganda push at home and increasingly abroad, new report says ( www.aspi.org.au )
Archived link without Cloudflare...
Chinese network behind one of world’s ‘largest online scams’: Vast web of fake shops touting designer brands took money and personal details from 800,000 people in Europe and US, data suggests ( www.theguardian.com )
A trove of data examined by experts indicates the operation is highly organised, technically savvy – and ongoing....
EU says three Chinese electric vehicle makers have not supplied sufficient information for its anti-subsidy investigation, warns it would "use evidence available elsewhere to compute tariffs" ( www.euractiv.com )
Archived version....
Pro-Russia hackers target critical infrastructure in North America and Europe ( securityaffairs.com )
Cross posted from: https://feddit.de/post/11698243...
Apple's 'incredibly private' Safari is not so private in Europe ( www.theregister.com )
Apple's grudging accommodation of European antitrust rules by allowing third-party app stores on iPhones has left users of its Safari browser exposed to potential web activity tracking....
China's recent campaign against domestic social media targeted falsehood and sensationalism. But the country's state-run media, not to be touched by the purge, are some of the worst culprits. ( chinamediaproject.org )
Cross posted from: https://feddit.de/post/11475895...
Amazon- and Google-backed AI firm Anthropic says “general-purpose AI tools simply could not exist” if AI companies had to pay licences for the training material ( www.computerweekly.com )
Generative artificial intelligence (GenAI) company Anthropic has claimed to a US court that using copyrighted content in large language model (LLM) training data counts as “fair use”, however....
Krebs on Security: "Using Google Search to Find Software Can Be Risky" ( krebsonsecurity.com )
Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate sources of the same software, can make...
Google's monopoly in the ad industry lets them profit off allowing scam ads to flourish, with no consequences ( checkmyads.org )
Google is spoon-feeding fake “Shark Tank approved” weight loss gummy candies to innocent people — and making money doing it.
How an algorithm denied food to thousands of poor in India ( www.aljazeera.com )
India runs one of the world’s largest food security programmes, which promises subsidised grains to about two-thirds of its 1.4 billion population....
Human Rights Watch accuses Facebook-parent Meta of falling short to protect LGBT people from harassment and doxxing ( www.hrw.org )
Human Rights Watch interviewed dozens of LGBT people who indicated that they had reported being harassed, doxxed, outed, and abused on Facebook and Instagram, but in all these cases, Meta either did not respond to their complaints or found that the content they reported did not violate its policies, and the content remained...
China raises private hacker army to probe foreign governments ( www.newsweek.com )
Chinese state institutions issue rewards for finding the cybersecurity vulnerabilities in software that is often used by foreign governments, in what may be a subtle new form of state-backed cyber warfare. At the same time, China is promoting young cybersecurity engineers in a doubling of its efforts to probe foreign systems for...
Work inside the machine of the music industry: How pre-saves and algorithmic marketing turn musicians into influencers ( algorithmwatch.org )
Streaming platforms allow users to add upcoming tracks to their playlists, in order to listen to them as soon as they are released. While this sounds harmless, it changed the habits of independent musicians, who feel they have to adapt to yet another algorithm.
Your next Windows PC may need at least 16GB of RAM ( www.ghacks.net )
Google confirms it just laid off around a thousand employees ( www.theverge.com )
But there may be more, and it’s possible that Google is attempting to spread out the bad news instead of having it hit all at once.
‘The tide has turned’: why parents are suing US social media firms after their children’s death ( www.theguardian.com )
While social media firms have long faced scrutiny from Congress and civil rights organizations over their impact on young users, the new wave of lawsuits underscores how parents are increasingly leading the charge, said Jim Steyer, an attorney and founder of Common Sense media, a non-profit that advocates for children’s online...
Security researchers warned Apple as early as 2019 about vulnerabilities in its AirDrop wireless sharing function that Chinese authorities claim they recently used to track down users ( edition.cnn.com )
A Chinese tech firm, Beijing-based Wangshendongjian Technology, was able to compromise AirDrop to identify users on the Beijing subway accused of sharing “inappropriate information,” judicial authorities in Beijing said this week....
eBay agreed to pay maximal possible fine of $3 million after employees harassed, intimidated, and stalked a Massachusetts couple in retaliation for their critical reporting of the online marketplace ( arstechnica.com )
eBay's harassment campaign against the couple, David and Ina Steiner, stretched for 18 days in August 2019 and was led by the company's former senior director of safety and security, Jim Baugh. It started when then-CEO Devin Wenig and then-chief communications officer Steven Wymer decided to "take down" the Steiners after...
Judge finds evidence that Tesla, Musk knew about Autopilot defect that led to killing of Florida man ( www.reuters.com )
Bryant Walker Smith, a University of South Carolina law professor, called the judge’s summary of the evidence significant because it suggests “alarming inconsistencies” between what Tesla knew internally, and what it was saying in its marketing....
Facebook Watches Teens Online As They Prep for College ( themarkup.org )
An investigation by the media organization The Markup found the pixel by Facebook and Instagram-parent Meta on dozens of popular websites targeting kids from kindergarten to college, including sites that students are all but required to use if they want to participate in school activities or apply to college....
Swedish company Northvolt develops new state-of-the-art sodium-ion battery produced with locally sourced materials, entirely independent of traditional battery value chains ( feddit.de )
Cross-posted from: feddit.de/post/5922898...
A secret Google deal let Spotify completely bypass Android’s app store fees ( www.theverge.com )
Google fought to keep the Spotify numbers private during its antitrust fight with Epic, saying they could damage negotiations with other app developers who might want more generous rates. Google’s User Choice Billing program, launched in 2022, is typically described as shaving about 4 percent off Google’s Play Store...
YouTube limits Video Viewing for Ad blocker Users ( samrome58.substack.com )
Artificial intelligence guzzles billions of liters of water ( feddit.de )
Cross-posted from: feddit.de/post/5792180...
A threat actor abuses Google Ads to distribute malicious CPU-Z app from fake Windows news site, Malwarebytes reports ( feddit.de )
Cross-posted from: feddit.de/post/5535431...
Amazon used an algorithm to essentially raise prices on other sites, the FTC says ( apnews.com )
The new excerpts unveiled Thursday allege executives at the e-commerce giant intentionally deleted communication by using a feature on the popular app Signal that makes messages disappear. By doing this, the FTC said Amazon “destroyed more than two years” worth of communications from June 2019 to “at least early 2022”...
Fake Cisco Webex Google Ads abuse tracking templates to push malware ( www.malwarebytes.com )
A new malvertising campaign is targeting corporate users who are downloading the popular web conferencing software Webex. Threat actors have bought an advert that has been online for almost a week and that impersonates Cisco’s brand and is displayed first when performing a Google search. The malware being used in this campaign...
Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet ( github.com )
There is a possible way for a general purpose NFC reader to read the full card number and expiry details when the device is in locked screen mode due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation....
BLASTPASS: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild ( citizenlab.ca )
Last week, while checking the device of an individual employed by a Washington DC-based civil society organization with international offices, Citizen Lab found an actively exploited zero-click vulnerability being used to deliver NSO Group’s Pegasus mercenary spyware. This latest find shows once again that civil society is...
A decentralized, blockchain-based messaging network for safer communications ( techxplore.com )
Researchers from several institutes worldwide recently developed Quarks, a new, decentralized messaging network based on blockchain technology. Their proposed system could overcome the limitations of most commonly used messaging platforms, allowing users to retain control over their personal data and other information they share...
How Open Source Can Affect Sustainability ( iode.tech )
Farewell to John Warnock, an internet pioneer and co-inventor of the PDF whose invention actually made the world better ( techxplore.com )
Warnock, who died Saturday, was one of the leading computer scientists of his era and co-founder in 1982 of Adobe Inc.
"Automated Racism": China's Hikvision still sells Uyghur-tracking surveillance cameras, powered by America's Nvidia ( ipvm.com )
Despite assurances for years that Hikvision has stopped minority analytics, just 7 months ago local PRC authorities awarded a $6 million contract that explicitly requires Hikvision analytics to identify Uyghurs (维族), powered by NVIDIA hardware, security specialist IPVM says.
Unleash the potential of your phone: Rooting your device does not void its warranty ( fsfe.org )
AI-Created Art Isn’t Copyrightable, U.S. Judge Says in Ruling That Could Give Hollywood Studios Pause ( www.hollywoodreporter.com )
How to Move Your Instagram Feed to Pixelfed, the Photo App That Doesn't Track Your Every Move ( www.wired.com )
Google Tests an A.I. Assistant That Offers Life Advice ( web.archive.org )
The tech giant is evaluating tools that would use artificial intelligence to perform tasks that some of its researchers have said should be avoided....