Skip to main content
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Advanced Search
Content Type:
Video
Cargo Planes, Trains and Automobiles
Thursday, September 30, 2021
Content Type:
Examples
IBM claims its i2 software can identify terrorists
Friday, December 1, 2017
Content Type:
Examples
Secret Uber "Greyball" programme undermines regulators
Friday, December 1, 2017
Content Type:
Examples
Hong Kong computes images from DNA samples to publicly shame litterbugs
Friday, December 1, 2017
Content Type:
Examples
Uber breaks Apple's iPhone rules
Friday, December 1, 2017
Content Type:
Long Read
CrowdStrike: What the 2024 outage reveals about security
Tuesday, December 17, 2024
Content Type:
Examples
Facial recognition fails at forensic reliability
Sunday, December 3, 2017
Content Type:
Examples
Personalised online ads enables invisible - and illegal - discrimination
Sunday, December 3, 2017
Content Type:
Examples
Beijing installs facial recognition to deter toilet paper theft
Sunday, December 3, 2017
Content Type:
Examples
FBI facial recognition database proceeds without oversight
Sunday, December 3, 2017
Content Type:
Examples
Databases of facial images proliferate
Friday, December 1, 2017
Content Type:
Examples
Facial payment systems develop apace in China
Friday, December 1, 2017
Content Type:
Examples
As Finland freezes DDoS attack paralyses heating systems
Friday, December 1, 2017
Content Type:
Examples
Swedish hub offers workers microchip implants to replace access control and credit cards
Friday, December 1, 2017
Content Type:
Examples
Data breach exposes Wonga customers in the UK and Poland
Friday, December 1, 2017
Content Type:
Examples
London Metropolitan Police unit caught spying on activists and journalists
Friday, December 1, 2017
Content Type:
Examples
Garadget punishes complaining customer with lockout
Friday, December 1, 2017
Content Type:
Examples
Cheap phones leave poorer users vulnerable
Friday, December 1, 2017
Content Type:
Examples
Facebook research targeted insecure youth
Friday, December 1, 2017
Content Type:
Examples
Fitbit data tests murder suspect's alibi
Friday, December 1, 2017
Content Type:
Examples
Internet of Things provides new tools for domestic abusers
Friday, December 1, 2017
Content Type:
Examples
Lawsuit alleges that Bose headphones spy on users
Friday, December 1, 2017
Content Type:
Examples
Jharkhand government website leaks personal details of 1 million Aadhaar subscribers
Friday, December 1, 2017
Content Type:
Case Study
Case Study: Smart Cities and Our Brave New World
Wednesday, August 30, 2017
Content Type:
Case Study
Case Study: Super-Apps and the Exploitative Potential of Mobile Applications
Wednesday, August 30, 2017
Content Type:
Case Study
Case Study: The Myth of Device Control and the Reality of Data Exploitation
Wednesday, August 30, 2017
Content Type:
Case Study
Case Study: Connected Cars and the Future of Car Travel in the Digital Age
Wednesday, August 30, 2017
Content Type:
Case Study
Case Study: Profiling and Elections - How Political Campaigns Know Our Deepest Secrets
Wednesday, August 30, 2017
Content Type:
Case Study
Case Study: Fintech and the Financial Exploitation of Customer Data
Wednesday, August 30, 2017
Content Type:
Case Study
Case Study: The Gig Economy and Exploitation
Wednesday, August 30, 2017
Pagination
Current page
1
Page
2
Page
3
Page
4
Page
5
Page
6
Page
7
Page
8
Page
9
…
Next page
››
Last page
Last »
Get Involved
Act with Us
Donate
Join