Skip to main content

Home/ ITGSonline/ Group items matching "privacy,accounts" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
dr tech

Stop Saying Privacy Is Dead - Member Feature Stories - Medium - 0 views

  •  
    "As privacy scholar Josh Fairfield says, while some dismiss privacy concerns by saying they have nothing to hide, we shouldn't accept that argument from anyone wearing clothes. Or anyone who closes the bathroom door, locks her home or car, or uses password-protected accounts. Or anyone who benefits from rules and norms that protect secrecy and confidentiality, prohibit government overreach, and give us recourse if others intrude upon our seclusion, publicly disclose embarrassing private facts, depict us in a false light, or appropriate our image or likeness. "
dr tech

Zoom Is a Nightmare. So Why Is Everyone Still Using It? - 0 views

  •  
    "Princeton computer science professor Arvind Narayanan calls Zoom a "privacy disaster," filled with "creepy" features that send tracking data to Facebook even if you don't have a Facebook account and tell meeting hosts if attendees aren't paying attention. Zoom's privacy policy allows it to use what it calls "customer content" for advertising purposes."
dr tech

50 ways to leave your lover, but four to sniff browser history * The Register - 0 views

  •  
    ""History sniffing" promises a nose full of dust or, you're talking about web browsers, a whiff of the websites you've visited. And that may be enough to compromise your privacy and expose data that allows miscreants to target you more effectively with tailored attacks. For example, a phishing gambit that attempts to simulate your bank login page has a better chance of success if it presents the web page for a bank where you actually have an account."
dr tech

How Facebook and Other Sites Manipulate Your Privacy Choices | WIRED - 0 views

  •  
    "Researchers call these design and wording decisions "dark patterns," a term applied to UX that tries to manipulate your choices. When Instagram repeatedly nags you to "please turn on notifications," and doesn't present an option to decline? That's a dark pattern. When LinkedIn shows you part of an InMail message in your email, but forces you to visit the platform to read more? Also a dark pattern. When Facebook redirects you to "log out" when you try to deactivate or delete your account? That's a dark pattern too."
amenosolja

How to Use USB Security Keys with your Google Account - 0 views

  •  
    "The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app - like Authy or Google Authenticator - or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area"
aren01

Protocols, Not Platforms: A Technological Approach to Free Speech | Knight First Amendment Institute - 1 views

  •  
    "Some have argued for much greater policing of content online, and companies like Facebook, YouTube, and Twitter have talked about hiring thousands to staff up their moderation teams.8 8. April Glaser, Want a Terrible Job? Facebook and Google May Be Hiring,Slate (Jan. 18, 2018), https://slate.com/technology/2018/01/facebook-and-google-are-building-an-army-of-content-moderators-for-2018.html (explaining that major platforms have hired or have announced plans to hire thousands, in some cases more than ten thousand, new content moderators).On the other side of the coin, companies are increasingly investing in more and more sophisticated technology help, such as artificial intelligence, to try to spot contentious content earlier in the process.9 9. Tom Simonite, AI Has Started Cleaning Up Facebook, But Can It Finish?,Wired (Dec. 18, 2018), https://www.wired.com/story/ai-has-started-cleaning-facebook-can-it-finish/.Others have argued that we should change Section 230 of the CDA, which gives platforms a free hand in determining how they moderate (or how they don't moderate).10 10. Gohmert Press Release, supra note 7 ("Social media companies enjoy special legal protections under Section 230 of the Communications Act of 1934, protections not shared by other media. Instead of acting like the neutral platforms they claim to be in order obtain their immunity, these companies have turned Section 230 into a license to potentially defraud and defame with impunity… Since there still appears to be no sincere effort to stop this disconcerting behavior, it is time for social media companies to be liable for any biased and unethical impropriety of their employees as any other media company. If these companies want to continue to act like a biased medium and publish their own agendas to the detriment of others, they need to be held accountable."); Eric Johnson, Silicon Valley's Self-Regulating Days "Probably Should Be" Over, Nancy Pelosi Says, Vox (Apr. 11, 2019), https:/
  •  
    "After a decade or so of the general sentiment being in favor of the internet and social media as a way to enable more speech and improve the marketplace of ideas, in the last few years the view has shifted dramatically-now it seems that almost no one is happy. Some feel that these platforms have become cesspools of trolling, bigotry, and hatred.1 1. Zachary Laub, Hate Speech on Social Media: Global Comparisons, Council on Foreign Rel. (Jun. 7, 2019), https://www.cfr.org/backgrounder/hate-speech-social-media-global-comparisons.Meanwhile, others feel that these platforms have become too aggressive in policing language and are systematically silencing or censoring certain viewpoints.2 2. Tony Romm, Republicans Accused Facebook, Google and Twitter of Bias. Democrats Called the Hearing 'Dumb.', Wash. Post (Jul. 17, 2018), https://www.washingtonpost.com/technology/2018/07/17/republicans-accused-facebook-google-twitter-bias-democrats-called-hearing-dumb/?utm_term=.895b34499816.And that's not even touching on the question of privacy and what these platforms are doing (or not doing) with all of the data they collect."
dr tech

Hacker Steals Millions of User Account Details from Education Platform Edmodo - Motherboard - 0 views

  •  
    "A hacker has stolen millions of user account details from popular education platform Edmodo, and the data is apparently for sale on the so-called dark web. Teachers, students and parents use Edmodo to work on lesson plans, assign homework, and more. The organization claims to have over 78 million members."
dr tech

'Surveillance capitalism': critic urges Toronto to abandon smart city project | Cities | The Guardian - 0 views

  •  
    ""As we have made clear, we believe that data collected in public space must be overseen and closely controlled by an independent and publicly accountable Data Trust, not Sidewalk Labs, Google, or any private company," said spokesperson Keerthana Rang."
dr tech

Lizzo: Facebook and Instagram remove abusive comments from singer's accounts - BBC News - 0 views

  •  
    "Lizzo's comments came just a week after Instagram unveiled a new feature that allows users to limit comments and DM requests during "spikes of increased attention". The feature, which users can opt in or out of, automatically hides comments from accounts that don't follow the user or only recently followed the user."
dr tech

Admiral to price car insurance based on Facebook posts | Technology | The Guardian - 0 views

  •  
    "Admiral Insurance will analyse the Facebook accounts of first-time car owners to look for personality traits that are linked to safe driving. For example, individuals who are identified as conscientious and well-organised will score well. Facebook forces Admiral to pull plan to price car insurance based on posts Read more The insurer will examine posts and likes by the Facebook user, although not photos, looking for habits that research shows are linked to these traits. These include writing in short concrete sentences, using lists, and arranging to meet friends at a set time and place, rather than just "tonight"."
dr tech

Online scams 'target Apple customers for richer pickings' - BBC News - 0 views

  •  
    "Cybercriminals are targeting people using Apple products as they are more likely to have disposable income, a security expert has warned. Blogger Graham Cluley said that while malware was more common on Windows, Apple customers could not "afford to be lackadaisical" about security. On Monday, he reported a text message scam that tried to trick people into handing over account information. Apple's support site warns customers not to enter details on spoof sites."
dr tech

Millions of hacked LinkedIn IDs advertised 'for sale' - BBC News - 0 views

  •  
    "A hacker is advertising what he says is more than one hundred million LinkedIn logins for sale. The IDs were reportedly sourced from a breach four years ago, which had previously been thought to have included a fraction of that number. At the time, the business-focused social network said it had reset the accounts of those it thought had been compromised."
dr tech

17 ransomware cases flagged to Singapore authorities this year: CSA - Channel NewsAsia - 0 views

  •  
    "That is when the alarm bells went off for Mr Ang. "I saw that there was a text file inside the encrypted folder that showed that it was ransomware, asking for payment to decrypt the files." The company decided not to pay the ransom of US$1,000 (S$1,447). Instead, it spent a week rebuilding about 3,000 infected files with data of the accounts and stocks from hard copy files."
dr tech

Hundreds of US police forces have distributed malware as "Internet safety software" - Boing Boing - 0 views

  •  
    "But Computercop isn't security software -- quite the opposite; it's classic malware. The software, made in New York by a company that markets to law enforcement, is a badly designed keylogger that stores thingstyped into the keyboard -- potentially everything typed on the family PC -- passwords, sensitive communications, banking logins, and more, all stored on the hard drive, either in the clear, or with weak, easily broken encryption. And Computercop users are encouraged to configure the software to email dumps from the keylogger to their accounts (to spy on their children's activity), so that all those keystrokes are vulnerable to interception by anyone between your computer and your email server. "
dr tech

Facebook Is Breached by Hackers, Putting 50 Million Users' Data at Risk - The New York Times - 0 views

  •  
    "Three software flaws in Facebook's systems allowed hackers to break into user accounts, including those of the top executives Mark Zuckerberg and Sheryl Sandberg, according to two people familiar with the investigation but not allowed to discuss it publicly. Once in, the attackers could have gained access to apps like Spotify, Instagram and hundreds of others that give users a way to log into their systems through Facebook."
dr tech

Facebook launches 'clear history' tool - but it won't delete anything | Technology | The Guardian - 0 views

  •  
    "The new feature, part of a wider set of tools covering "off-Facebook activity", will not delete anything from Facebook's servers, instead simply "disconnecting" data from an individual user's account."
dr tech

Contact apps won't end lockdown. But they might kill off democracy | John Naughton | Opinion | The Guardian - 0 views

  •  
    "There are clear indications that the UK government is now actively considering use of the technology as a way of easing the lockdown. If this signals an outbreak in Whitehall of tech "solutionism" - the belief that for every problem there is a technological answer - then we should be concerned. Tech solutions often do as much harm as good, for example, by increasing social exclusion, lacking accountability and failing to make real inroads into the problem they are supposedly addressing."
dr tech

British Parliament hit by cyber security attack - media reports - The Economic Times - 0 views

  •  
    ""Closer investigation by our team confirmed that hackers were carrying out a sustained and determined attack on all parliamentary user accounts in an attempt to identify weak passwords. These attempts specifically were trying to gain access to our emails. "
1 - 20 of 27 Next ›
Showing 20 items per page