Category - Privacy & Security News

Aussies, mark “Get a VPN Day” with CyberGhost

Starting today, Australian ISPs (Internet Service Providers) begin metadata harvest. The law forces internet providers and telecommunications companies to keep and store information generated by customers calling, texting or using the internet.

According to Australian digital rights activists “Digital Rights Watch“, this data collection program requires no warrants, has very little oversight and has received condemnation from human rights experts worldwide.

That is why today has been declared a national day of action or “Get a VPN Day“, an opportunity through which citizens can educate themselves about the scale of this surveillance and take all the necessary measures to protect themselves.

Starting today, #Australian #ISPs begin metadata harvest. Protect your privacy and get #CyberGhost VPN now! Click to Tweet

Read More

Booking.com to be blocked in Turkey, according to court order

A Turkish court has ordered the travel website Booking.com to be blocked in a dispute with the country’s main travel agency association, Turkey’s state-run news agency reported on Wednesday, according to the Associated Press (quoted by ABC News).

The Anadolu Agency reported that a commercial court in Istanbul ordered the move against Booking.com as a “precautionary measure” while the case is ongoing.

Lawyers for the Association of Turkish Travel Agencies had argued that Netherlands-based Booking.com was engaging in unfair competition in the marketing of hotels in Turkey.

Anadolu said that government authorities are expected to block access to the website as soon as they receive official notification from the court.

If you're in #Turkey and booking.com is blocked, access it for free with #CyberGhost Click to Tweet

Read More

The end of an era? ISPs get green light to sell users’ web history

The US Senate and Congress have both voted to eliminate broadband privacy rules that would have required ISPs (Internet Service Providers) to get consumers’ explicit consent before selling or sharing web browsing data and other personal data with advertisers as well as other companies.

 

ISP now stands for “invading subscriber privacy”

… in the words of senator Ed Markey, a Democrat.

The Republican-controlled Senate voted along party lines to repeal Internet privacy protections that were approved by the Federal Communications Commission just days before Donald Trump won the election.

The rules, which had not yet gone into effect, would have required Internet service providers to get the person’s permission before collecting and sharing personal data on everything from web browsing history to geo-location information.

Providers would also have been required to notify customers about the types of information collected and shared.

But on March 23rd all this turned into a mere dream. The Senate prevents all of these rules from taking effect, unless the House or President Trump decide otherwise. And we strongly doubt the latter would happen.

Read More

Torrents and political media, the world’s most censored digital content

It’s no secret that censorship thrives around the world. An updated map of global Internet censorship in 2017 has recently been published by a hosting website and by simply giving the statistics a look, one can see that torrents are by far the most frowned upon online. This kind of censorship is probably the only one to occur in those generally regarded as democratic countries.

It’s easy to understand why torrents are the ones to suffer various forms of censorship around the world. Copyright-protected materials such as movies, music or software licenses are probably the main source of income for everyone involved in their creative & development process and piracy would only come in the way of profit.

Other reasons for this type of censorship include a so-called state-enforced morality, which implies that citizens are not capable of deciding what’s good and what’s bad for them. This kind of justification not only refers to the censorship of torrents, but also to social and political media.

Worldwide, the list of Internet censorship looks as follows:

Read More

WikiLeaks opens Vault 7, exposes CIA hacking tools

WikiLeaks has begun a new series of leaks on the US Central Intelligence Agency, code-named Vault 7.

The first full part of the series, “Year Zero”, is made up of a massive amount of over 8,000 documents from an isolated, high-security network located inside the CIA’s Center for Cyber Intelligence in Langley, Virgina.

According to a press release from WikiLeaks, recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. Zero-day flaws are previously undiscovered vulnerabilities in software, which can be exploited to alter the behavior of a product and the WikiLeaks document shows that the CIA has built up a significant stockpile of zero-day flaws to use for surveillance.

“Year Zero” brings forth the weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into undercover microphones.

Here are some of the most important documents set to be brought forth by WikiLeaks:

 

iPhones, Android devices and smart TVs, the main targets of the CIA malware

It appears that the CIA has developed a software capable of spying on just about every piece of electronic equipment people use, from smartphones to routers and smart TVs. Thus, everything recorded by those devices, from deliberately sent messages, user location to everything we say or do near those gadget’s microphones and cameras can become accessible to the US intelligence agency.

Samsung smart TVs for instance get infected with the “Weeping Angel” malware, developed by the CIA’s Embedded Devices Branch (EDB). Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.

Your #TV could be spying on you even when it's off. Find out how from the #WikiLeaks #Vault7 dumps Click to Tweet
Read More

Ghostie’s Weekly Digest: Teddy bears leak 2 million voice messages and more

The Internet of Things continues to show that it will probably be the biggest threat to our privacy in the future. That is why we should think twice before purchasing the next Internet-connected gadget, or even worse, IoT toys for our children. Such devices can be very easily transformed into spying tools.

Why did we feel the need for such a warning, at this time in particular? Just have a look at one of the most important updates of the week and you will understand:

Millions of voice messages and passwords leaked through Internet of Toys

CloudPets, a company that sells “smart” teddy bears has leaked 800,000 user account credentials, which hackers then locked it and held for ransom. The toys allow children and relatives to send recorded voicemails back and forth.

This same incident happened over a year ago, when Hong Kong toymaker VTech was hacked, exposing snaps of parents and their children as well as chat logs. An estimate of 6.4 million were affected by this hack last year.

Find out how to avoid the dangers brought by the Internet of Toys from here.

 

Digital privacy, threatened by new FCC Chairman

U.S. regulators just blocked some Obama administration rules on the eve of implementation, regulations that would have subjected broadband providers to stricter scrutiny than web sites face to protect customers’ private data.

In other words, ISPs would have carte blanche when it comes to rifling through, sharing, and selling your private data.

Electronic Frontier Foundation is encouraging people to take action and tell their Congress representatives that they will not accept their efforts to undermine online privacy acts. Take action at this link.

Read More

Ghostie’s Weekly Digest: Cloudflare bug exposes customer data and more

Digital security always offers us food for thought and debate. So, here are the most important updates of the week:

 

Cloudflare leaks sensitive user data from millions of websites

Cloudflare, a service that helps optimize the security and performance of more than 5.5 million websites, warned its customers on February 23rd that a recently fixed bug exposed highly sensitive personal data, including passwords, cookies and tokens used to authenticate users.

According to the Cloudflare blog, the bug was serious because the leaked memory could contain private information and because it had been cached by search engines. However, no evidence of malicious exploits of the bug or other reports of its existence were discovered. Get the full story here.

PLEASE NOTE: CyberGhost VPN was in no way affected by this leak.

Read More

© 2017 CyberGhost