Tres maneras en las que Facebook usa tu información de WhatsApp – El Mostrador

Cuando la red social más popular compró la plataforma de mensajería más usada en todo el mundo dijo que no usaría los datos de los clientes WhatsApp. Pero ahora sí lo hace. Te contamos para qué necesita toda esa información.

Fuente: Tres maneras en las que Facebook usa tu información de WhatsApp – El Mostrador


Prominent Human Rights Activists in Egypt Targeted by Sophisticated Hacking Attacks

The campaign, which the reports call Nile Phish, coincides with an unprecedented crackdown on civil society in Egypt over the past few years, with non-governmental organizations and their staff being subjected to interrogations, arrests, travel bans, asset freezes, forced closures and a long-running trial over accusations of receiving foreign funding to destabilize the country.

Fuente: Prominent Human Rights Activists in Egypt Targeted by Sophisticated Hacking Attacks


Watch How Casually False Claims are Published: New York Times and Nicholas Lemann Edition

Like most people, I’ve long known that factual falsehoods are routinely published in major media outlets. But as I’ve pointed out before, nothing makes you internalize just how often it really happens, how completely their editorial standards so often fail, like being personally involved in a story that receives substantial media coverage. I cannot count how many times I’ve read or heard claims from major media outlets about the Snowden story that I knew, from first-hand knowledge, were a total fabrication.We have a perfect example of how this happens from the New York Times today, in a book review by Nicholas Lemann, the Pulitzer-Moore professor of journalism at Columbia University as well as a long-time staff writer for The New Yorker.

Fuente: Watch How Casually False Claims are Published: New York Times and Nicholas Lemann Edition


Three New Scandals Show How Pervasive and Dangerous Mass Surveillance Is in the West, Vindicating Snowden

While most eyes are focused on the presidential race between Hillary Clinton and Donald Trump, three major events prove how widespread, and dangerous, mass surveillance has become in the West. Standing alone, each event highlights exactly the severe threats that motivated Edward Snowden to blow his whistle; taken together, they constitute full-scale vindication of everything he’s done.

Fuente: Three New Scandals Show How Pervasive and Dangerous Mass Surveillance Is in the West, Vindicating Snowden


Germany orders Facebook to stop collecting WhatsApp user data | Technology | The Guardian

National data protection authority blocks recent privacy changes made by social network and commands existing shared data and phone numbers be deleted for 35 million users

Fuente: Germany orders Facebook to stop collecting WhatsApp user data | Technology | The Guardian


Yahoo faces questions over delay in data breach revelation – FT.com

ft.com > Companies >TechnologySubscribe Sign in Home World Companies Energy Financials Health Industrials Luxury 360 Media Retail & Consumer Tech Telecoms Transport By Region Tools Markets Global Economy Lex Comment Work & Careers Life & Arts Try the new FT.comLast updated: September 23, 2016 11:59 pmYahoo faces questions over delay in data breach revelationNic Fildes and Madhumita Murgia in London, Tim Bradshaw in San Francisco Share Print Clip Commentsepa05552696 The Yahoo logo is pictured on a computer monitor in Taipei, Taiwan, 23 September 2016. According to news reports on 23 September, around 500 million Yahoo account users information had been stolen or hacked on its network in 2014. EPA/RITCHIE B. TONGO©EPAYahoo chief executive Marissa Mayer and her board are facing serious questions over the handling of the largest-ever cyber attack recorded, as customers, regulators and even its new owners search for answers on why a two-year-old data breach has only just come to light.

Fuente: Yahoo faces questions over delay in data breach revelation – FT.com


La clave de cifrado global de BlackBerry, en manos de la polícia

Problemas para BlackBerry. Mientras Apple lucha en los tribunales -y fuera de ellos- para proteger la privacidad de los usuarios, Vice News desvela, a través de documentos por un caso de asesinato, cómo la Policía Canadiense habría obtenido la clave de cifrado global de BlackBerry, haciendo de la seguridad del sistema… algo prácticamente inservible y al servicio de las fuerzas y cuerpos de seguridad de Canadá. ¿Y lo peor del asunto? según fuentes de Vice, poseen esta clave desde 2010.

Fuente: La clave de cifrado global de BlackBerry, en manos de la polícia


We cannot trust our government, so we must trust the technology | US news | The Guardian

Apple’s battle with the FBI is not about privacy v security, but a conflict created by the US failure to legitimately oversee its security service post Snowden

Fuente: We cannot trust our government, so we must trust the technology | US news | The Guardian


Facebook sigue sin cumplir con la legislación europea de privacidad

Facebook sigue sin cumplir con la legislación europea de privacidad.


Un informe elaborado por la Universidad de Lovaina concluye que Facebook sigue violando la legislación europea sobre privacidad, pese a que cambió sus políticas en enero

La red social se atribuye la potestad de rastrear a sus usuarios en webs y dispositivos, usar sus fotos de perfil para propósitos comerciales y no comerciales y recopilar información

En lo que se refiere al smartphone, Facebook no ofrece ninguna manera de que no se cree un registro con la localización del usuario a través de su aplicación móvil

El Centro Interdisciplinario para las Leyes y las Tecnologías de la Información y de la comunicación, perteneciente a la Universidad de Lovaina (en Bélgica), ha publicado un informe acerca de cómo casan los términos de servicio de Facebook con la legislación europea. Y las conclusiones presentadas indican que la red social viola la normativa europea en varios aspectos.

El trabajo lo ha encargado la Comisión de Privacidad de Bélgica, que ahora debe valorar los resultados. El informe está orientado a evaluar los cambios que Facebook hizo en sus condiciones y sus políticas respecto al usuario, que entraron en vigor a partir del 30 de enero. En el texto se apunta que la actualización solo ha “expandido políticas y prácticas antiguas”, mientras que “todavía viola la ley europea de protección al consumidor”.


Privacy fears over 'smart' Barbie that can listen to your kids | Technology | The Guardian

Privacy fears over ‘smart’ Barbie that can listen to your kids | Technology | The Guardian.

Hello Barbie toy
 Hello Barbie listens to children using cloud-based voice recognition technology, to understand them and talk back. Photograph: Mattel

A “smart” Barbie doll that can have “conversations” with children should not go on sale, privacy advocates have said.

Billed as the world’s first “interactive doll”, the toy uses voice recognition technology similar to that employed by Apple’s Siri and Google’s Now digital assistants to understand what a child is saying to Barbie and respond.

However, privacy advocates are worried about the use of voice recognition technology that sends recordings of children to third-party companies for processing, potentially revealing his or her intimate thoughts and details.

“If I had a young child, I would be very concerned that my child’s intimate conversations with her doll were being recorded and analysed,” said Professor Angela Campbell of Georgetown University law school.

“In Mattel’s demo, Barbie asks many questions that would elicit a great deal of information about a child, her interests, and her family. This information could be of great value to advertisers and be used to market unfairly to children.”


From GCHQ to tech giants: why the fight for your personal data matters | Technology | The Guardian

From GCHQ to tech giants: why the fight for your personal data matters | Technology | The Guardian.

It's now possible to find out what personal data GCHQ holds on you.It’s now possible to find out what personal data GCHQ holds on you. Photograph: GCHQ / British Ministry of Defence/EPA

Government agencies and companies across the world hold large amounts of data on each and every one of us. From profiles of your favourite movies to where you ate out last night, this vast mountain of data is a representation of you that you can do little about.

But is that strictly true? Can you find out what GCHQ, Facebook or Google hold on you? And can you get it removed?


How you could become a victim of cybercrime in 2015 | Technology | The Guardian

How you could become a victim of cybercrime in 2015 | Technology | The Guardian.

Cybersecurity experts’ predictions for the year ahead: from ransomware and healthcare hacks to social media scams and state-sponsored cyberwar

Will 2015 be a happy new year for cybercriminals?
 Will 2015 be a happy new year for cybercriminals? Photograph: Alamy

Will 2015 be a happy new year for internet users? Not if cybercriminals have their way.

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.

Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefender, KPMGAdaptiveMobile,Trend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKaspersky,Proofpoint and Sophos. The links lead to their full predictions.


Images from up to 200,000 teenagers leaked on to internet after users lured into saving images on Snapsaved.com

jennifer lawrence
It is suspected that those behind the Snapchat scam are linked to the people responsible for the collection and posting of nude photos taken by hundreds of celebrities, including Jennifer Lawrence. Photograph: Axelle/Bauer-Griffin/FilmMagic

Videos and pictures of as many as 200,000 teenagers posted via the Snapchat service and stored on a third party website have been put online, apparently by the same people who were behind the posting of nude celebrity photos in August.

The photos and videos were captured after some users of Snapchat – a mobile phone app which allows people to send photos to each other but which delete themselves within seconds of being viewed – were tempted into using a site called “Snapsaved.com”. That offered to let them use the service on a website on a desktop computer, rather than just on a mobile phone.

But the site appears to have been maliciously saving the users’ login details and storing the photos and videos that were posted. An app called Snapsave, which offers similar functionality but whose developer says it only stores photos on the user’s mobile phone, is not believed to be involved.

By getting a user’s username and password, the site could authorise itself to Snapchat’s servers, and receive or send pictures they viewed through it but could also store it without the knowledge of the user or Snapchat.

It is suspected, but not so far proven, that those behind the scam are linked to those responsible for the collection and posting in August of personal and often nude photos taken by hundreds of celebrities, including Jennifer Lawrence and Kim Kardashian. The celebrity photo leak began with discussions on one of the 4chan discussion forums, and the latest photos have also come via 4chan leaks.

After warnings appeared on the bulletin board 4chan on Friday that the photos would be leaked, a site went live on Sunday offering 13 gigabytes of content which was said to have been captured from users.


Facebook te seguirá manipulando, pero con más cuidado | Ciencia | EL PAÍS

Facebook te seguirá manipulando, pero con más cuidado | Ciencia | EL PAÍS.

La red social anuncia cambios en su forma de experimentar con los usuarios tras la polémica que provocó un estudio en el que fomentaron sentimientos positivos y negativos

ampliar foto

Los experimentos con usuarios serán supervisados. / Facebook

Durante una semana de 2012, Facebook sometió a casi 700.000 de sus usuarios a un experimento para comprobar si las emociones son contagiosas en las redes sociales. Para ello, provocó que algunos internautas vieran más publicaciones tristes y que otros vieran más noticias positivas de entre las que comparten sus amigos. El resultado fue que los usuarios se contagiaron aunque mínimamente por estos sentimientos, usando más palabras negativas o positivas en sus propias publicaciones. Cuando se conoció este estudio a través de una revista científica el pasado junio, se abrió una controversia sobre los límites éticos de este tipo de experimentos, esencialmente porque las cobayas humanas no sabían que lo eran.

Ante la avalancha de críticas, Facebook pidió disculpas y se replanteó cómo enfocar este problema: algunos temieron que cerraran su equipo de científicos sociales o que, sencillamente, dejaran de publicar sus experimentos: ojos que no ven, opinión pública que no se indigna. Ahora, tras tres meses de reflexión, la compañía que dirige Mark Zuckerberg ha anunciado que tratarán de cuidar mejor los límites éticos y la supervisión de estos estudios. “Estamos comprometidos con la investigación para mejorar Facebook, pero queremos hacerlo de la manera más responsable”, asegura en una nota Mike Schroepfer, director de Tecnología de la red social.


You Can Get Hacked Just By Watching This Cat Video on YouTube – The Intercept

You Can Get Hacked Just By Watching This Cat Video on YouTube – The Intercept.

By 190

Many otherwise well-informed people think they have to do something wrong, or stupid, or insecure to get hacked—like clicking on the wrong attachments, or browsing malicious websites. People also think that the NSA and its international partners are the only ones who have turned the internet into a militarized zone. But according to research I am releasing today at the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, many of these commonly held beliefs are not necessarily true. The only thing you need to do to render your computer’s secrets—your private conversations, banking information, photographs—transparent to prying eyes is watch a cute cat video on YouTube, and catch the interest of a nation-state or law enforcement agency that has $1 million or so to spare.

To understand why, you have to realize that even in today’s increasingly security-conscious internet, much of the traffic is still unencrypted. You might be surprised to learn that even popular sites that advertise their use of encryption frequently still serve some unencrypted content or advertisements. While people now recognize that unencrypted traffic can be monitored, they may not recognize that it also serves as a direct path into compromising their computers.

Companies such as Hacking Team and FinFisher sell devices called “network injection appliances.” These are racks of physical machines deployed inside internet service providers around the world, which allow for the simple exploitation of targets. In order to do this, they inject malicious content into people’s everyday internet browsing traffic. One way that Hacking Team accomplishes this is by taking advantage of unencrypted YouTube video streams to compromise users. The Hacking Team device targets a user, waits for that user to watch a YouTube clip like the one above, and intercepts that traffic and replaces it with malicious code that gives the operator total control over the target’s computer without his or her knowledge. The machine also exploits Microsoft’s login.live.com web site in the same manner.

Fortunately for their users, both Google and Microsoft were responsive when alerted that commercial tools were being used to exploit their services, and have taken steps to close the vulnerability by encrypting all targeted traffic. There are, however, many other vectors for companies like Hacking Team and FinFisher to exploit.

In today’s internet, there are few excuses for any company to serve content unencrypted. Anyunencrypted traffic can be maliciously tampered with in a manner that is invisible to the average user. The only way to solve this problem is for web providers to offer fully encrypted services.


Extraños en mi Twitter | Tecnología | EL PAÍS

Extraños en mi Twitter | Tecnología | EL PAÍS.

El servicio añade contenido de personas a las que no se sigue sin previo aviso

A

La obsesión por hacer que los usuarios pasen más y más tiempo en su servicio ha hecho que Twitter rompa una de sus premisas iniciales. El ‘timeline’, lugar reservado para consultar el contenido de los perfiles que se siguen, ha comenzado a mostrar tuits de personas a las que no se sigue. Un movimiento que certifica el triunfo del algoritmo, del cálculo basado en los intereses del servicio y la inteligencia artificial, sobre la preferencia personal. De momento, se trata de cuentas cuyo contenido está relacionado con el que se ha escogido de manera manual, pero deja una puerta abierta a la inclusión de publicidad, a intercalarla sin consulta previa.

Este tipo de cambios se consideran normales dentro del servicio. A comienzos de semana decidieron convertir los tuits marcados como favoritos, normalmente para indicar que gustaron al lector o una manera de almacenar, en retuits, es decir, que enviaban a todos los seguidores.

La red social no ha emitido comunicado alguno, pero sí ha cambiado los términos de uso: “Cuando identificamos un tuit o una cuenta a seguir, o cualquier otro contenido que es popular o relevante, podemos añadirlo a tu ‘timeline’. Esto significa que, a veces, verás tuits de cuentas que no sigues. Seleccionamos cada tuit a partir de algunas señales, como su popularidad o cómo tus contactos lo están movimento. Nuestra meta es que tu portada sea cada vez más relevante e interesante”.