Skip to main content
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Impact Search
Our impact in the world
Content type:
Examples
China's Ant Financial deploys credit-worthiness scores
3rd May 2018
Content type:
Examples
Car insurers turn to third parties to verify mileage
3rd May 2018
Content type:
Examples
Chinese researchers claim AI can spot criminal faces
3rd May 2018
Content type:
Examples
Neural network successfully identifies obscured faces
3rd May 2018
Content type:
Examples
Facebook algorithm identifies photographs when faces are obscured
3rd May 2018
Content type:
Examples
Facebook has tested, but does not use, location data to recommend Friends
3rd May 2018
Content type:
Examples
Facebook and Google link online ads to offline sales
3rd May 2018
Content type:
Examples
Big data surveillance turns on low-income communities
3rd May 2018
Content type:
Examples
US politicians share supporter data across campaigns
3rd May 2018
Content type:
Examples
Researchers find choice of apps correlates with demographics
3rd May 2018
Content type:
Examples
German consumer group complains that Samsung TVs harvest personally identifiable information
3rd May 2018
Content type:
Examples
"Shadowy" risk mitigation industry spreads use of secret databases
3rd May 2018
Content type:
Examples
Usage-based insurance brings close driver monitoring
3rd May 2018
Content type:
Examples
Met police officers wrongfully access and leak the identity of a protected witness
3rd May 2018
Content type:
Examples
Gap closes between secret intelligence and "open source" information
3rd May 2018
Content type:
Examples
Chinese government social media programme seeks to distract the public
3rd May 2018
Content type:
Examples
Gabon signs up to Microsoft's CityNext for capital Libreville
3rd May 2018
Content type:
Examples
Facial recognition systems display inherent bias
3rd May 2018
Content type:
Examples
Poor security raises dangers for Internet of Things
3rd May 2018
Content type:
Examples
Affective computing provides new frontier in user manipulation
3rd May 2018
Content type:
Examples
Personal data lives on after the sites that collected it are gone
3rd May 2018
Content type:
Examples
Chinese military authorities ban smartwatches and wearables on security grounds
3rd May 2018
Content type:
Examples
Nest cameras continue monitoring surroundings even when switched "off"
3rd May 2018
Content type:
Examples
Researchers develop viral attack that could paralyse a city's LED light bulbs
3rd May 2018
Content type:
Examples
MIT shows how wifi can be used to accurately track people and objects
3rd May 2018
Content type:
Examples
Predictive modelling "abuses and brutalises" New Zealand benefits recipients
3rd May 2018
Content type:
Examples
Researchers find ultrasound Internet of Things hacking risks
3rd May 2018
Content type:
Examples
AI-judged beauty contest picks disproportionate number of white winners
3rd May 2018
Content type:
Examples
NSA researches usefulness of internet-connected biomedical devices for foreign intelligence gathering
3rd May 2018
Content type:
Examples
Canadian military issues tender for pick-up truck hacker
3rd May 2018
Pagination
First page
« First
Previous page
‹‹
…
Page
84
Page
85
Page
86
Page
87
Current page
88
Page
89
Page
90
Page
91
Page
92
…
Next page
››
Last page
Last »
Get Involved
Act with Us
Donate
Join