Thursday, February 15, 2024

iPhone Apps Secretly Harvest Data When They Send Notifications

 Over Three Decades, Tech Obliterated MediaKara Swisher, New York Magazine


UBS Loses to Whistleblower in Wide-Reaching Supreme Court Decision WSJ

 

Buying Spying: How the commercial surveillance industry works and what can be done about it

Google: “Spyware is typically used to monitor and collect data from high-risk users like journalists, human rights defenders, dissidents and opposition party politicians. These capabilities have grown the demand for spyware technology, making way for a lucrative industry used to sell governments and nefarious actors the ability to exploit vulnerabilities in consumer devices. 

Though the use of spyware typically only affects a small number of human targets at a time, its wider impact ripples across society by contributing to growing threats to free speech, the free press and the integrity of elections worldwide. To shine a light on the spyware industry, today, Google’s Threat Analysis Group (TAG) is releasing Buying Spying, an in-depth report with our insights into Commercial Surveillance Vendors (CSVs). 

TAG actively tracks around 40 CSVs of varying levels of sophistication and public exposure. The report outlines our understanding of who is involved in developing, selling, and deploying spyware, how CSVs operate, the types of products they develop and sell, and our analysis of recent activity.”


 Nightshade: a new tool artists can use to *poison* AI models that scrape their online work
 Offshore Wind Farms Vulnerable to Cyberattacks
Rizwan Choudhury
 Tesla Hacked at Pwn2Own Automotive 2024
Sergiu Gatlan
 America's Dangerous Trucks
Frontline
 Authorities investigating massive security breach at Global Affairs Canada
CBC
 Why the 737 MAX 9 door plug blew out
Lauren Weinstein
 Man sues Macy's, saying false facial recognition match led to jail assault
WashPost
 Bugs in our pockets: the risks of client-side scanning
Journal of Cybersecurity Oxford Academic
 Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training
Arxiv
 ERCIM News 136 published - Special Theme: Large Language Models
Peter Kunz
 Deepfake Audio of Biden Alarms Experts
Margi Murphy
 The Great Freight-Train Heists of the 21st Century
Slashdot
 Nightshade: a new tool artists can use to *poison* AI models that scrape their online work
Lauren Weinstein
 ChatGPT is leaking passwords from private conversations of users
Ars Technica reader says
 Impact of AI on Software Development
Taylor Soper
 AI maxim
Lauren Weinstein
 Is American Journalism Headed Toward an Extinction-Level Event?
geoff goodfellow
 Huge Proportion of Internet Is AI-Generated Slime, Researchers Find
Maggie Harrison
 How Beloved Indie Blog 'The Hairpin' Turned Into an AI Clickbait Farm
WiReD
 Twitter/X says that it has temporarily blocked some searches for Taylor Swift while they try deal with the flood of AI-porn related to her
LW
 Taylor Swift, Travis Kelce and a MAGA Meltdown
NYTimes
 YOUR PAPERS PLEASE! - Florida House passes bill that would ban children under 16 from social media
Axios
 Hawley and the tech CEOs
Lauren Weinstein
 Congress and the states want to bring a Chinese-style police state Internet to the U.S.
Lauren Weinstein
 iPhone Apps Secretly Harvest Data When They Send Notifications
Thomas Germain
 In India, an algorithm declares them dead; they have to prove they're alive
Steve Bacher
 Tech Layoffs Shock Young Workers. The Older People? Not So Much.
NYTimes
 Re: Even after a recall, Tesla's Autopilot does dumb dangerous things
Geoff Kuenning
 Re: ChatGPT can answer yes or no at the same time
Amos Shapir
 Re: Tesla Drivers in Chicago Confront a Harsh Foe: Cold Weather (Goldberg,
John Levine
 One-star rating deserved for apps that allow full-screen ads
Dan Jacobson
 Info on RISKS (comp.risks)