Skip to main content
Sign up to Newsletter
NEWS
ACT
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Search
Content type:
Examples
Affective computing provides new frontier in user manipulation
3rd May 2018
Content type:
Examples
Personal data lives on after the sites that collected it are gone
3rd May 2018
Content type:
Examples
Chinese military authorities ban smartwatches and wearables on security grounds
3rd May 2018
Content type:
Examples
Nest cameras continue monitoring surroundings even when switched "off"
3rd May 2018
Content type:
Examples
Researchers develop viral attack that could paralyse a city's LED light bulbs
3rd May 2018
Content type:
Examples
MIT shows how wifi can be used to accurately track people and objects
3rd May 2018
Content type:
Examples
Predictive modelling "abuses and brutalises" New Zealand benefits recipients
3rd May 2018
Content type:
Examples
Researchers find ultrasound Internet of Things hacking risks
3rd May 2018
Content type:
Examples
AI-judged beauty contest picks disproportionate number of white winners
3rd May 2018
Content type:
Examples
NSA researches usefulness of internet-connected biomedical devices for foreign intelligence gathering
3rd May 2018
Content type:
Examples
Canadian military issues tender for pick-up truck hacker
3rd May 2018
Content type:
Examples
California passes privacy legislation for smart TVs
3rd May 2018
Content type:
Examples
Data-driven hiring systems may incorporate unfairness
3rd May 2018
Content type:
Examples
Russian art project both highlights and illustrates big data issues
3rd May 2018
Content type:
Examples
NHS England-approved apps found leaking unencrypted personal data
3rd May 2018
Content type:
Examples
Banks turn to smartphone metadata to assess lending risk
3rd May 2018
Content type:
Examples
The new way police are surveilling you: Calculating your threat ‘score’
3rd May 2018
Content type:
Examples
Social media sites push back against police
3rd May 2018
Content type:
Examples
Governments adopt social media as tool for surveillance and propaganda
3rd May 2018
Content type:
Examples
Walmart spies on workforce to oppose union organising
3rd May 2018
Content type:
Examples
Uber app exposed hundreds of drivers' licences and Social Security numbers
3rd May 2018
Content type:
Examples
Criminologists use geographical locations to identify Banksy
3rd May 2018
Content type:
Examples
US intelligence chiefs warn of new data manipulation cyber threat
3rd May 2018
Content type:
Examples
ProPublica analysis finds bias in COMPAS criminal justice risk scoring system
3rd May 2018
Content type:
Examples
Improperly anonymised taxi logs pose reidentification risks
3rd May 2018
Content type:
Examples
US court filings show that no-fly list uses predictive assessments instead of hard evidence
3rd May 2018
Content type:
Examples
TomTom sells location data to police
3rd May 2018
Content type:
Examples
India's "100 Smart Cities" plan raises questions of social division
3rd May 2018
Content type:
Examples
Anti-Choice Groups Use Smartphone Surveillance to Target ‘Abortion-Minded Women’ During Clinic Visits
3rd May 2018
Content type:
Examples
Mall of America used fake Facebook account to surveil Black Lives Matter activists
3rd May 2018
Pagination
First page
« First
Previous page
‹‹
…
Page
110
Page
111
Page
112
Page
113
Current page
114
Page
115
Page
116
Page
117
Page
118
…
Next page
››
Last page
Last »
Get Involved
Act with Us
Donate
Join