Skip to main content

Home/ Digit_al Society/ Group items tagged Users

Rss Feed Group items tagged

dr tech

The debate over Facebook's political ads ignores 90% of its global users | Julia Carrie... - 0 views

  •  
    "The paradox here is that Facebook is more accountable to US lawmakers and reporters than it is to any other country's. It is incumbent on American politicians and the American press to keep this in mind - and push Facebook to answer questions about how its policies will apply to the vast majority of its users."
dr tech

Rival disinformation campaigns targeted African users, Facebook says | Technology | The... - 0 views

  •  
    "Rival French and Russian disinformation campaigns have sought to deceive and influence internet users in the Central African Republic ahead of an election later this month, Facebook said on Tuesday. Facebook said it was the first time it had seen foreign influence operations directly engage on its platforms, with fake accounts denouncing each other as "fake news"."
neoooo

Apple's Not Digging Itself Out of This One: "Online researchers say they have found fla... - 0 views

  •  
    "Apple's Not Digging Itself Out of This One: "Online researchers say they have found flaws in Apple's new child abuse detection tool that could allow bad actors to target iOS users.""
dr tech

It looks like China did have access to U.S. TikTok user data | Mashable - 0 views

  •  
    "TikTok has already come under fire for its data collection, and this is just another step in yet another app collecting information on its users and doing whatever it pleases with it. It seems being online in 2022 is becoming more and more difficult to do while maintaining some semblance of privacy and data autonomy."
ocean14

Privacy Without Monopoly: Data Protection and Interoperability | Electronic Frontier Fo... - 0 views

  •  
    "A new regime of interoperability can revitalize competition in the space, encourage innovation, and give users more agency over their data; it may also create new risks to user privacy and data security. This paper considers those risks and argues that they are outweighed by the benefits. New interoperability, done correctly, will not just foster competition, it can be a net benefit for user privacy rights."
dr tech

Britain seeks opt-out of new European social media privacy laws | Technology | guardian... - 0 views

  •  
    "'Right to be forgotten' laws, giving users - rather than services such as Facebook - control of personal data will save billions of euros and thickets of red tape. So why is Britain resisting?"
dr tech

Admiral to price car insurance based on Facebook posts | Technology | The Guardian - 0 views

  •  
    "Admiral Insurance will analyse the Facebook accounts of first-time car owners to look for personality traits that are linked to safe driving. For example, individuals who are identified as conscientious and well-organised will score well. Facebook forces Admiral to pull plan to price car insurance based on posts Read more The insurer will examine posts and likes by the Facebook user, although not photos, looking for habits that research shows are linked to these traits. These include writing in short concrete sentences, using lists, and arranging to meet friends at a set time and place, rather than just "tonight"."
dr tech

Vietnam 'blocks' Facebook over the weekend due to protests over dead fish - 0 views

  •  
    "So over the weekend, when protesters were expected to rally for the third time, Facebook was inaccessible to locals, who had been using the platform to organise. People also had problems accessing Facebook's Instagram service. Israeli VPN service Hola posted a statement saying it saw a surge of about 200,000 users from Vietnam on its system over the weekend, using it to access Facebook."
dr tech

Uber knows you're more likely to pay surge prices when your phone is dying - 0 views

  •  
    "Uber knows when your phone battery is running low because its app collects that information in order to switch into power-saving mode. But Chen swears Uber would never use that knowledge to gouge you out of more money. "We absolutely don't use that to kind of like push you a higher surge price, but it's an interesting kind of psychological fact of human behavior," Chen said. Uber's surge pricing uses a proprietary algorithm that accounts for how many users are hailing rides in an area at a given time. Customers are apparently less willing to believe that when the multiplier is a round number like 2.0 or 3.0, which seems more like it could have been arbitrarily made up by a human."
dr tech

China launches quantum satellite for 'hack-proof' communications | World news | The Gua... - 0 views

  •  
    ""The satellite's two-year mission will be to develop 'hack-proof' quantum communications, allowing users to send messages securely and at speeds faster than light," Xinhua reported."
dr tech

Blue Feed, Red Feed - WSJ.com - 0 views

  •  
    "To demonstrate how reality may differ for different Facebook users, The Wall Street Journal created two feeds, one "blue" and the other "red." If a source appears in the red feed, a majority of the articles shared from the source were classified as "very conservatively aligned" in a large 2015 Facebook study. For the blue feed, a majority of each source's articles aligned "very liberal." These aren't intended to resemble actual individual news feeds. Instead, they are rare side-by-side looks at real conversations from different perspectives. "
dr tech

Hackers are selling powerful cyber weapons to anyone with the money to buy them - 0 views

  •  
    "This person or group, who go by the names BestBuy and Popopret, recently spammed an ad to folks on Jabber, an instant messaging service. They offered to perform a distributed denial of service (DDoS) attack on whomever their client(s) wanted, and they backed up their offer by claiming to wield the ability to perform some of the strongest DDoS attacks ever seen. Recent events in the history of the internet show us that these kind of attacks - if these hackers indeed have the power they claim - can wreak internet havoc by blocking user access to a range of some of the web's most popular destinations."
dr tech

Reclaim the Internet research reveals huge scale of social media misogyny | Technology ... - 0 views

  •  
    "To coincide with the launch, the campaign has released research by Demos revealing the huge scale of social media misogyny. The study monitored the use of the words "slut" and "whore" by UK Twitter users over three weeks from the end of April. It found that 6,500 individuals were targeted by 10,000 aggressive and misogynistic tweets in that period."
dr tech

Waze is an awesome driving app that also lets hackers stalk you / Boing Boing - 0 views

  •  
    "Researchers at the University of California-Santa Barbara recently discovered a Waze vulnerability that allowed them to create thousands of "ghost drivers" that can monitor the drivers around them-an exploit that could be used to track Waze users in real-time. They proved it to me by tracking my own movements around San Francisco and Las Vegas over a three-day period."
dr tech

Facebook news selection is in hands of editors not algorithms, documents show | Technol... - 0 views

  •  
    "But the documents show that the company relies heavily on the intervention of a small editorial team to determine what makes its "trending module" headlines - the list of news topics that shows up on the side of the browser window on Facebook's desktop version. The company backed away from a pure-algorithm approach in 2014 after criticism that it had not included enough coverage of unrest in Ferguson, Missouri, in users' feeds."
dr tech

Turkey coup plotters' use of 'amateur' app helped unveil their network | Technology | T... - 0 views

  •  
    "Security experts who looked at the app, known as ByLock, at the request of Reuters said it appeared to be the work of amateur software developers and had left important information about its users unencrypted."
dr tech

Major sites including New York Times and BBC hit by 'ransomware' malvertising | Technol... - 0 views

  •  
    "The malware was delivered through multiple ad networks, and used a number of vulnerabilities, including a recently-patched flaw in Microsoft's former Flash competitor Silverlight, which was discontinued in 2013. When the infected adverts hit users, they redirect the page to servers hosting the malware, which includes the widely-used (amongst cybercriminals) Angler exploit kit. That kit then attempts to find any back door it can into the target's computer, where it will install cryptolocker-style software, which encrypts the user's hard drive and demands payment in bitcoin for the keys to unlock it."
« First ‹ Previous 61 - 80 of 277 Next › Last »
Showing 20 items per page