Category Archive: Technology

Judge: President Trump blocking people on Twitter is unconstitutional

Donald Trump’s use of Twitter has long been controversial, and he has developed something of a penchant for blocking people who dare to question or criticize him. Earlier this year a judge suggested that he should make use of the mute option instead of blocking Twitter users, and now another judge has ruled that blocking …

Continue reading »

Facebook asks British users to submit their nudes as protection against revenge porn

Following on from a trial in Australia, Facebook is rolling out anti-revenge porn measures to the UK. In order that it can protect British users from failing victim to revenge porn, the social network is asking them to send in naked photos of themselves. The basic premise of the idea is: send us nudes, and …

Continue reading »

Download all the information Apple holds about you from its new Data and Privacy portal

If you’ve ever been curious about just what data Apple has gathered and stored about you over the years, now you can find out — if you’re in Europe, at least. The iPhone-maker has just launched a new Data and Privacy portal in order to comply with GDPR which comes into force across the EU …

Continue reading »

Amazon is selling its face recognition technology to US law enforcement agencies

A Freedom of Information Act (FOIA) request by the American Civil Liberties Union (ACLU) shows that Amazon has started selling facial recognition software to at least two US law enforcement agencies. A report published by the ACLU shows that the online retailer has been advertising its facial recognition system — known as Amazon Rekognition, and …

Continue reading »

Zuckerberg’s appearance in front of the EU was an utter joke

Yesterday, Facebook CEO Mark Zuckerberg appeared in front of members of the European Parliament to answer questions and to address concerns that the EU has about the social network in general, and its use of private data in particular — thanks largely to the Cambridge Analytica data scandal. At least that was the idea. What …

Continue reading »

Trend Micro launches Zero Browser for iOS — a web browser that protects your privacy

Trend Micro has a new privacy-focused mobile browser for iOS users called Zero Browser. It has been designed specifically to block a range of tracking techniques, including the invasive activity-recording “session replay” method. The company says that the browser was created to overcome the shortcomings of existing “incognito” browsing modes and brings an extra level …

Continue reading »

Microsoft will roll out ‘key’ GDPR rights globally… not just in Europe

The clock is ticking for the arrival of GDPR (or General Data Protection Regulation) in Europe. As of May 25 — this Friday — new regulations will give people greater access to the data companies store about them and the right to have it deleted. Microsoft is among the global technology firms that will have …

Continue reading »

Comcast website leaks details of Xfinity users — including router passwords

Security researchers have discovered a bug in the Comcast website that makes it possible to gather information about Xfinity users. As well as customer data such as home addresses, it is also possible to access wireless network details including passwords. The bug was reported by Karan Saini and Ryan Stevenson after they found it was …

Continue reading »

WWDC could see the arrival of a new Siri voice and a new HomePod

It’s only a couple of week until Apple’s Worldwide Developer Conference, and it’s looking as though we could be getting a new voice for Siri — and possibly a new HomePod. This is not just idle speculation or the usual industry rumor mill working overtime — this time around it is Siri itself providing the …

Continue reading »

Red Hat responds to Speculative Store Bypass and helps explain Variant 4 chip vulnerability

As news of yet another chip vulnerability creeps out, computer users, businesses and organizations around the world are trying to assess how the latest bug affects them. To help its users and others to understand what the Speculative Store Bypass/Variant 4 vulnerability means, Red Hat has issued advisories and an explanatory video. The company also …

Continue reading »

Older posts «

» Newer posts