No Picture

Facebook Wants You to Get Even More Political

October 26, 2016 12:21 pm Paula Kift 0
By Sofia Grafanaki Facebook rolled out a new feature last week, allowing users to officially endorse a presidential candidate. It is very simple to use – all a user needs to do is go on the candidate’s Facebook page and click on the “endorsement” tab to add his/her own endorsement.…
No Picture

Google’s Clever Plan to Stop Aspiring ISIS Recruits

October 20, 2016 4:51 pm Paula Kift 0
By Sofia Grafanaki A new and promising approach seeks to disrupt ISIS online recruiting efforts through targeted advertising, as presented at a recent event at the Brookings Institution. Google’s tech incubator Jigsaw (previously called Google Ideas), together with Moonshot CVE, Quantum Communications, and the Gen Next Foundation, developed a plan to help the fight against terrorism.…
No Picture

Digital Ellis Islands

February 25, 2016 8:47 am Paula Kift 0
American tech companies, especially those running social networking sites, often pride themselves on giving voice and information to oppressed netizens around the world. Many commend Twitter’s role in facilitating coordination and information flow during the 2009 Iranian presidential election process. Even the U.S.…
No Picture

U.S. Gets Widespread Facial Recognition Technology

November 17, 2015 1:38 pm Paula Kift 0
This past week, Fortune reported that U.S. retailers were using facial recognition software to target shoplifters.[1] The technology works by scanning the face of customers entering a store and seeking to match the photograph with a group of previously identified individuals.…
No Picture

How Does the Trans-Pacific Partnership Affect Users, Security Researchers?

October 16, 2015 9:24 am Paula Kift 0
Last Friday, Wikileaks released the copyright chapter of the Trans-Pacific Partnership (TPP). The chapter included a section stating that “judicial authorities shall, at least, have the authority to […] order the destruction of devices and products found to be involved in” any activity that circumvents software controls that manufacturers build into their devices, known as Digital Rights Management (DRM) technology.…