Over Three Decades, Tech Obliterated MediaKara Swisher, New York Magazine
UBS Loses to Whistleblower in Wide-Reaching Supreme Court Decision WSJ
Buying Spying: How the commercial surveillance industry works and what can be done about it
Google: “Spyware is typically used to monitor and collect data from high-risk users like journalists, human rights defenders, dissidents and opposition party politicians. These capabilities have grown the demand for spyware technology, making way for a lucrative industry used to sell governments and nefarious actors the ability to exploit vulnerabilities in consumer devices.
Though the use of spyware typically only affects a small number of human targets at a time, its wider impact ripples across society by contributing to growing threats to free speech, the free press and the integrity of elections worldwide. To shine a light on the spyware industry, today, Google’s Threat Analysis Group (TAG) is releasing Buying Spying, an in-depth report with our insights into Commercial Surveillance Vendors (CSVs).
TAG actively tracks around 40 CSVs of varying levels of sophistication and public exposure. The report outlines our understanding of who is involved in developing, selling, and deploying spyware, how CSVs operate, the types of products they develop and sell, and our analysis of recent activity.”
- Offshore Wind Farms Vulnerable to Cyberattacks
- Rizwan Choudhury
- Tesla Hacked at Pwn2Own Automotive 2024
- Sergiu Gatlan
- America's Dangerous Trucks
- Frontline
- Authorities investigating massive security breach at Global Affairs Canada
- CBC
- Why the 737 MAX 9 door plug blew out
- Lauren Weinstein
- Man sues Macy's, saying false facial recognition match led to jail assault
- WashPost
- Bugs in our pockets: the risks of client-side scanning
- Journal of Cybersecurity Oxford Academic
- Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training
- Arxiv
- ERCIM News 136 published - Special Theme: Large Language Models
- Peter Kunz
- Deepfake Audio of Biden Alarms Experts
- Margi Murphy
- The Great Freight-Train Heists of the 21st Century
- Slashdot
- Nightshade: a new tool artists can use to *poison* AI models that scrape their online work
- Lauren Weinstein
- ChatGPT is leaking passwords from private conversations of users
- Ars Technica reader says
- Impact of AI on Software Development
- Taylor Soper
- AI maxim
- Lauren Weinstein
- Is American Journalism Headed Toward an Extinction-Level Event?
- geoff goodfellow
- Huge Proportion of Internet Is AI-Generated Slime, Researchers Find
- Maggie Harrison
- How Beloved Indie Blog 'The Hairpin' Turned Into an AI Clickbait Farm
- WiReD
- Twitter/X says that it has temporarily blocked some searches for Taylor Swift while they try deal with the flood of AI-porn related to her
- LW
- Taylor Swift, Travis Kelce and a MAGA Meltdown
- NYTimes
- YOUR PAPERS PLEASE! - Florida House passes bill that would ban children under 16 from social media
- Axios
- Hawley and the tech CEOs
- Lauren Weinstein
- Congress and the states want to bring a Chinese-style police state Internet to the U.S.
- Lauren Weinstein
- iPhone Apps Secretly Harvest Data When They Send Notifications
- Thomas Germain
- In India, an algorithm declares them dead; they have to prove they're alive
- Steve Bacher
- Tech Layoffs Shock Young Workers. The Older People? Not So Much.
- NYTimes
- Re: Even after a recall, Tesla's Autopilot does dumb dangerous things
- Geoff Kuenning
- Re: ChatGPT can answer yes or no at the same time
- Amos Shapir
- Re: Tesla Drivers in Chicago Confront a Harsh Foe: Cold Weather (Goldberg,
- John Levine
- One-star rating deserved for apps that allow full-screen ads
- Dan Jacobson
- Info on RISKS (comp.risks)