Number of Posts: 39
Posts 1 - 10
For this company, online surveillance leads to profit in Washington’s suburbs
Newspaper | Washington Post
Date | 10.9.2017
Language | English
Country | U.S.
Topic Tags | emojis, privacy, social media, threat
Summary | Babel Street is a startup that uses online surveillance; they try to get private information from online platforms in order to catch cybercriminals. For instance, police departments might use the service provided by the company in their investigations and scan posts online. Experts try to track dangerous criminals while analyzing posts in more than 200 languages, including the emoji language. Emoji has actually been a challenge for analysts. Another challenge the company faces is to make sure sure it doesn't violate people's privacy.
Image Description | Photograph of a man standing in a news room in front of several TVs, and two other people.
Image Tags | female(s), male(s)
Facebook Faces a New World as Officials Rein In a Wild Web
Newspaper | The New York Times
Date | 17.9.2017
Language | English
Country | U.S.
Topic Tags | censorship, Facebook, marketing, privacy, social media, threat
Summary | Facebook’s head of global policy management recently agreed to remove anything that violates the Vietnamese law from the social network. Governments around the world (even in the US) are increasingly trying to keep control of what's happening online. As a result, governments and big tech companies such as Google, Apple, Facebook or Amazon don't always agree with each other. On the one hand, big tech companies want to have more control and power, and on the other hand, nations want to gain more control over people's online behvior. Facebook's desire to expand everywhere (e.g. in China) is one of the reasons for today's struggle between tech companies and nations. Facebook also faced some issues in Europe and Africa.
Image Description | Photograph of people using computers in a computer room, map of Facebook's users, two women laughing in front of a board displaying social media icons, Mark Zuckerberg and other people running in China, Mark Zuckerberg, his wife and daughters, glass building, people in front of a thumb-up sign, woman, crowd (some of them are using their phones), and people on their computers.
Image Tags | computer/laptop, Facebook, female(s), male(s), smartphone, social media
Emma Watson, Emilia Clarke and Harry Styles Instagram accounts HACKED in major social media security breach
Newspaper | Mirror
Date | 1.9.2017
Language | English
Country | UK
Topic Tags | Instagram, privacy, social media, threat
Summary | A few celebrities' Instagram accounts have been hacked because of a bug in the system. The phone numbers and email addresses of celebrities were being sold on the dark web.
Image Description | Portraits of Emma Watson, Emilia Clarke and Harry Styles, charts, and hand on a keyboard.
Image Tags | chart, computer/laptop, female(s), hand(s), male(s)
To Survive in Tough Times, Restaurants Turn to Data-Mining
Newspaper | The New York Times
Date | 25.8.2017
Language | English
Country | U.S.
Topic Tags | marketing, privacy, research/study
Summary | Restaurants are facing tough times as people seem to visit restaurants less ofter rises. Now analytic firms have come up with software designs that collect data about customers and waiting staff to find inefficiencies and smooth them out. This way all waiters would recognize guests by name and know their order and payment preferences. It could revolutionize customer service in the hospitality industry.
Image Description | People looking at a chart.
Image Tags | chart, female(s), male(s)
Sick perverts ask schoolgirls to indecently expose themselves during lessons on live video app
Newspaper | Mirror
Date | 25.3.2016
Language | English
Country | UK
Topic Tags | childhood, pornography, privacy, school, smartphone, threat, video communication
Summary | Perverts have asked schoolgirls to expose themselves via live Periscope videos during lessons. While they were using the app, the girls received a lot of sexual comments. Periscope is an app that is also used by businesses and media organisations to stream events and conferences live. Viewers can then comment and ask questions live; those comments are displayed on screen and everyone can see them.
Image Description | Photograph of a student's hands holding a phone under a desk, photograph of an empty classroom,
Image Tags | cell phone, male(s), school
Byte-sized guide for parents on how they can keep their children safe online this summer
Newspaper | Mirror
Date | 3.8.2016
Language | English
Country | UK
Topic Tags | addiction, childhood, cyberbullying, privacy, research/study, threat
Summary | Parents want their kids to be safe online during the summer. A research shows that 8 to 16-year-old kids will spend about 130 hours on social media during the summer break. The article offers some tips to keep children safe (e.g. privacy and location settings, play together, how to deal with trolls and sexting, get children to play outside).
Image Description | Photograph of a kid holding a tablet of his/her lap, a kid's hand on a lapop, video about the Pokemon Go game, hand holding a smartphone, Minecraft characters, a little boy hiding his face, young woman making a face, two hands holding a smartphone, a child using a tablet.
Image Tags | female(s), game, hand(s), male(s), smartphone, tablet
The secret cyber-life of 10 year olds: Children admit to actively hiding their online activity from parents
Newspaper | Mirror
Date | 6.10.2016
Language | English
Country | UK
Topic Tags | childhood, privacy, research/study, threat
Summary | About 51% of ten year olds have their own tablet and a 33% own a smartphone. Also, 42% claim they can hide their online activities from their parents. Young children can easily have access to digital devices, and are being exposed to bad language, violence, and pornographic content online.
Image Description | Two photograph of young children (males) looking at a screen, photograph of three young kids (females) using and looking at a tablet,
Image Tags | female(s), male(s), tablet
Mother's horror after sick perverts target her six-year-old daughter through online gaming app for young children
Newspaper | Mirror
Date | 26.1.2017
Language | English
Country | UK
Topic Tags | childhood, game, pornography, privacy, threat
Summary | Using a popular mobile gaming app (Roblox), perverts have been sending kids explicit and inappropriate messages. They've been trying to lure kids and ask them for their addresses. Jemma Casey is the mother of 6-year old Morgan, who was sent indecent messages. Other children have also been targeted.
Image Description | Photograph of a mom and her daughter, screenshots of inappropriate messages, and photograph of a mom and her son.
Image Tags | female(s), male(s), text
The Rise and Fall of Yik Yak, the Anonymous Messaging App
Newspaper | The New York Times
Date | 27.5.2017
Language | English
Country | U.S.
Topic Tags | childhood, cyberbullying, law, privacy, social media, threat, youth
Summary | The anonymous messaging app Yik Yak became very popular in colleges and schools because it lets people broadcast anonymously to other users near them. The activity on the app has however started to become thretening with college students and children bullying each other and people making bomb threats that have led to multiple evacuations. A feminist group from University of Mary Washington have filed complaint to the University to block Yik Yak on campus because it has been used to harrass and threaten members.
Image Description | An illustration with a face and a smartphone and an image of the creators of Yik Yak.
Image Tags | male(s), smartphone
Spies could activate iPhone cameras and microphones if FBI forces us, says Apple
Newspaper | Telegraph
Date | 10.3.2016
Language | English
Country | UK
Topic Tags | privacy, threat
Summary | If the FBI wins the court battle over the unlocking of a terrorist's iPhone, it could lead to abuse. Indeed, the government could keep asking for access to people's phones in order to spy on civilians. Apple refused to let the FBI unlock the iPhone; if they create a special software to unlock iPhones, it could compromise the security of a lot of iPhone users.
Image Description | Photograph of an iPhone and photograph of a man speaking,
Image Tags | male(s), smartphone
Page 1 of 4
Back |
Next