The harassment of Quinn and others has nothing to do with concern for Holowka and his family and everything to do with making examples of women and queer people who dare to speak out.
It aspires to be a central outlet for the study of all manner of internet abuse, assembling for visiting researchers the necessary machine learning tools, big data analysts, and perhaps most importantly, access to major tech platforms' user data—a key to the project that may hinge on which tech firms cooperate, and to what degree.
With a few seconds of physical access to a phone, even apps as common as Google Maps and Apple's Find My Friends can be tweaked to persistently share a user's location with another contact while offering the phone's owner no notification or warning, the researchers told me.
On Thursday, researchers from the threat intelligence firm Mimecast are disclosing findings that an Excel feature called Power Query can be manipulated to facilitate established Office 365 system attacks.
Tom Simonite covers artificial intelligence for WIRED.Using Amazon’s facial recognition technology, Spotlight quickly returned a list of online sex ads featuring the girl’s photo. Thorn has previously built language processing tools to help law enforcement officers find child abuse content on the dark web.
Ahead of her talk, Galperin has notched her first win: Russian security firm Kaspersky announced today that it will make a significant change to how its antivirus software treats stalkerware on Android phones, where it's far more common than on iPhones.
Robson and Safechuck are the focus of the two-part, four-hour HBO documentary Leaving Neverland , in which they allege Jackson sexually abused them for the better part of a decade.
From Russian disinformation on Facebook, Twitter, and Instagram to YouTube extremism to drones grounding air traffic, Soltani argues, tech companies need to think not just about protecting their own users but about what he calls abusability: the possibility that users could exploit their tech to harm others, or the world.
New documents filed Monday with regulators in Poland, the UK, and Ireland claim that the way personal data is handled during the process of matching advertisements to ad slots does not comply with the European Union’s General Data Protection Regulation, a strict set of consumer privacy rules that went into effect in May. The documents focus on the categories that key players in the ad-tech industry have adopted to instantly match advertisers with appropriate users or content.
When the Academy Award nominations were announced Tuesday, I found comfort amid the nominees for Best Documentary—alongside Liu’s transformative portrait of abuse was Hale County This Morning, This Evening , director RaMell Ross’s impressionistic meditation on black southern life in Selma, Alabama.
Facebook wanted to make it clear that researchers shouldn't breach user data in the process of finding problems, but they should submit more nuanced types of data misuse reports whenever it was possible to document these complex interactions safely.Striking this balance is more challenging than it may initially seem, according to Alex Rice, CTO of the bug bounty development organization HackerOne. Rice consulted on Facebook's bug bounty when it launched in 2011, and says he was impressed to see it expand to accept privacy and third-party reports this year.