Number of Posts: 64
Posts 11 - 20
Spies could activate iPhone cameras and microphones if FBI forces us, says Apple
Newspaper | Telegraph
Date | 10.3.2016
Language | English
Country | UK
Topic Tags | privacy, threat
Summary | If the FBI wins the court battle over the unlocking of a terrorist's iPhone, it could lead to abuse. Indeed, the government could keep asking for access to people's phones in order to spy on civilians. Apple refused to let the FBI unlock the iPhone; if they create a special software to unlock iPhones, it could compromise the security of a lot of iPhone users.
Image Description | Photograph of an iPhone and photograph of a man speaking,
Image Tags | male(s), smartphone
Facebook lets streams of depravity flow freely
Newspaper | Washington Post
Date | 19.4.2017
Language | English
Country | U.S.
Topic Tags | censorship, Facebook, fake news, law, pornography, privacy, threat
Summary | Facebook is facing many criticisms about its poor enforcement of basic standards of content on the platform. Multiple violent live streams have been uploaded to Facebook in the past in it always took Facebook too long to take them down. Their algorithm to weed out pornography has backfired when they censored a historic photograph of a napalm victim from the Vietnam War because it registered as child pornography. After much denial, Facebook are finally taking steps against fake news spreading on their platform. All this may be called censorship but without moderation there can be no free speech because bullies dominate the discourse.
Image Description | N/A
The 'empowered consumer' doesn't get much say
Newspaper | Washington Post
Date | 16.4.2017
Language | English
Country | U.S.
Topic Tags | marketing, privacy, social media, threat
Summary | The perceived multiplication of choices in consumer culture, for example when buying a plane ticket (optional luggage fees, insurance fees, prioritized boarding fees, etc.), just looks like an advantage for the consumer on the surface. In the end, we end up paying more and giving away our data. The data will in turn be used to milk consumers even further by knowing to which advertisements they are particularly susceptible.
Image Description | Airport check-in area.
Image Tags | female(s), male(s)
Let's not let artificial intelligence become another bubble
Newspaper | Telegraph
Date | 15.1.2017
Language | English
Country | UK
Topic Tags | artificial intelligence, privacy, threat
Summary | At the World Economic Forum in Davos, everyone will be talking about artifical intelligence (AI). There have been major progress in the field thanks to natural language processing and machine learning. Future products will be using AI to improve our lifestyle; for instance, an electric toothbrush using deep learning algorithms can improve your dental hygiene. What is happening with AI today is not new, but what is different now is the speed; change is happening at a faster rate. However, to improve AI we will need more personal data, which will lead us to cross a creepy line in the future.
Image Description | N/A
Should I befriend my children and their pals online?
Newspaper | Telegraph
Date | 10.6.2017
Language | English
Country | UK
Topic Tags | childhood, privacy, social media, threat, youth
Summary | 80% of children between 11 and 15 years old have a smartphone. They spend a lot of time on social media platforms. Social media have a lot of advantages but they can also lead to social exclusion and embarrassment. According to a study, Instagram and Snapchat are the worst platforms for teenagers and young adults. As a result, some parents want to join the same social media sites and befriend their children so they can keep an eye on them. However, this might not be the right solution. Children and parents have a right to privacy.
Image Description | Photograph of a woman (foreground) and two children on their phone (background), a kid using and looking at a screen,
Image Tags | female(s), male(s), smartphone, tablet
Apple faces 11 other orders for suspects' electronic data
Newspaper | USA Today
Date | 24.2.2016
Language | English
Country | U.S.
Topic Tags | law, politics, privacy, threat
Summary | After Apple had refused to cooperate with the FBI in unlocking a terrorist's iPhone for investigation, the FBI are requesting their assistance again in elevn other criminal cases. Apple had refused the initial request in order not to sell out their users' privacy and were supported by other major tech firms.
Image Description | Text document showing the criminal cases in question in a table.
Image Tags | chart, text
5 easy and simple ways to protect your privacy online - how to prepare for the next big threat
Newspaper | Mirror
Date | 18.8.2016
Language | English
Country | UK
Topic Tags | privacy, threat
Summary | Privacy expert Mark Weinstein shares some tips to protect your privacy online: use safe internet browsers, be careful where you search (for instance, Google saves all of your searches), WhatsApp is not as private as what you might think, use a cloud storage that can't see your information, etc. We should be worried about our privacy in the future as governments are trying to get backdoor access to apps and digital devices. Millennials seem to be the ones that are most concerned about their online privacy.
Image Description | Photographs of a woman in front of social media icons, two hands using computer mice and a keyboard, fingers touching a screen displaying the Google search bar, WhatsApp icon, cloud storage icons, hand holding a smartphone in front of the Facebook logo, portrait of Tim Cook, and Facebook "laughing" reaction button
Image Tags | emojis, Facebook, female(s), Google, hand(s), keyboard, male(s), smartphone, social media, WhatsApp
Practice safe Internet on the road
Newspaper | USA Today
Date | 31.7.2017
Language | English
Country | U.S.
Topic Tags | email, privacy, smartphone, social media, threat
Summary | Traveling can be dangerous, especiallyin the digital age. Many travelers make themselves vulnerable to criminals by sharing their location on social media or by connecting to a password-free wifi which is often provided by scammers to hack into email accounts. In these cases virtual kidnapping becomes possible when travelers spend a few days somewhere off the grid and a local group claims to have kidnapped the traveler and blackmails their family for ransom.
Image Description | Getty image of a woman sitting in a train.
Image Tags | female(s)
Talk to your teen about Snapchat Ghost Mode, and track their time
Newspaper | USA Today
Date | 15.7.2017
Language | English
Country | U.S.
Topic Tags | addiction, privacy, research/study, Snapchat, threat, youth
Summary | Teenagers today mainly use Snapchat, 75% to be extact. In comparison, 66% use Facebook, and 47% use Twitter. One third of teenage Snapchat users said they use Snapchat because their parents are not on it. There are various apps that let parents track their children's activity on apps to make sure they do not approach addictive levels of usage. Another good way to track that is to join Snapchat as a parent and keep an eye on one's children from within the app - this is for parents who want to be less "lame" about watching over their children. Snapchat map is a recently added function that parents should be partticularly worried about enabling users to share their location at all times.
Image Description | Screenshots of Snapchat map showing user avatars and settings as well as surveillance apps for parents.
Image Tags | female(s), male(s), Snapchat
How can you protect your right to digital privacy at the border?
Newspaper | Washington Post
Date | 11.6.2017
Language | English
Country | U.S.
Topic Tags | law, privacy, smartphone, threat
Summary | American customs now ask some flight passengers to give airport officers access to their digital devices. While it is still a rare case, some passengers are asked to turn on their smartphone/tablet/laptop to demonstrate that it is not hooked up to an explosive. They also check whether illegal data is being transmitted over the border on the hardware storage. Passengers are advised to clean their storage and store all their personal files on a cloud.
Image Description | iStock image of a woman using a smartphone at an airport.
Image Tags | female(s), smartphone
Page 2 of 7
Back |
Next