By Kim Harrisberg | South Africa correspondent
From phishing traps to arrests based on their social media posts alone, activists from Russia to Uganda say they’re increasingly being watched for their online campaigning. |
By Kim Harrisberg | South Africa correspondent
From phishing traps to arrests based on their social media posts alone, activists from Russia to Uganda say they’re increasingly being watched for their online campaigning. |
By Samuel Woodhams | Digital rights researcher and journalist
Algorithms to determine welfare payments and detect fraud are becoming standard practice around the world. From Manchester to Melbourne, peoples’ lives are being shaped by secretive tools that determine who is eligible for what, and how much debt is owed. Although the technology has been around for some time, the outbreak of COVID-19 renewed enthusiasm for the digital welfare state and, for thousands of cash-strapped public bodies, the promise of increased efficiency and lower costs has proven irresistible. |
SecurityGen, the award-winning global provider of security solutions and services for the telecoms industry, today announced its cybersecurity priorities for telecom operators in 2023. Continue reading
Adrian Winckles, Anglia Ruskin University and Andrew Moore, Anglia Ruskin University
You may know nothing about it, but your phone – or your laptop or tablet – could be taken over by someone else who has found their way in through a back door. They could have infected your device with malware to make it a “bot” or a “zombie” and be using it – perhaps with hundreds of other unwitting victims’ phones – to launch a cyberattack.
Avast, a leading global digital security and privacy consumer brand by Gen™ (NASDAQ: GEN), anticipates an increased risk of ransomware attacks in 2023 threatening to leak people’s and businesses’ valuable data if ransom demands aren’t paid. Additionally, Avast researchers foresee optimization of social engineering used in scam attacks, taking advantage of economic hardships and energy crisis fears. The experts also expect increased malicious activity overall, as open-source malware becomes more accessible, and cybergangs recruit hacktivists to join their causes. Continue reading
The Met has overhauled its ‘Gangs Violence Matrix’ database following a legal challenge by human rights organisation, Liberty. The tool is used by the police force to identify and monitor people suspected of being involved in gang-related crime. Continue reading |
Neurotechnology, a provider of deep learning-based solutions and high-precision biometric identification technologies, today announced the release of SentiVeillance Cluster for real-time biometric face identification, tracking of people and vehicles and automatic vehicle license plate recognition. The solution has been designed for expansive surveillance systems supporting continuous video streams from multiple servers. It provides operators with structured and sorted live data, enabling faster decision-making in a variety of scenarios, including law enforcement, security and smart city monitoring applications. Continue reading
By Samuel Woodhams | Digital rights researcher and journalist
Targeted online advertisements are impossible to ignore. Ads based on our browsing history, geolocation, and personal information appear constantly on our social media feeds, news articles, and streaming platforms. As the authors of a new report on the advertising surveillance industry put it: “Targeted advertising is unavoidable for anyone who owns a smartphone or goes online.” Continue reading |
By Samuel Woodhams | Digital rights researcher and journalist
Video doorbells are everywhere now, sold as a modern security solution that can help protect your home and belongings. They let you greet guests remotely, deter would-be parcel thieves, and could even reduce the cost of your home insurance. Continue reading |
By Rand Hammoud, Surveillance Campaigner, Access Now
Surveillance technology is weaponry – it targets, tracks, invades, and decimates – and its unbridled use is a far-reaching, destructive violation of human rights. It is an assault rifle in the sustained global offensive on civic space, and we need a global moratorium on its export, sale, transfer, servicing, and use. Continue reading