Internet ethics
Cyberethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.
In the lat...
YouTube mistakenly shuts down conservative channels, videos
Kairos CEO Ankur Jain on the European Union issuing strict guidelines for tech companies' handling of terror content and how Rhino helps renters avoid security deposits.
Report: Facebook Has “An Army Of Filipinos” Policing Offensive Content For £1.81/hr – MILO NEWS
He searches the world for the cheapest labor possible and than wants the government to pay a minimum income. The hypocracy is astounding.
Zuckerberg Says Facebook Plans To Crack Down On Fake News
Facebook founder Mark Zuckerberg released a statement on how his company is working to mitigate fake news.
Why Is Typo Hashtag #HillaryForPrision Trending On Twitter?
Hashtag #HillaryForPrision began trending on Twitter Monday morning — and no, this writer didn’t just strike a typo on his MacBook Air.
All the Ways Your Wi-Fi Router Can Spy on You
It can even be trained to read your lips.
Google Can Now Tell You When And Where You Were Mentioned Online
The company's new Stay In The Loop feature does just that. If you weren’t scared that Google knows too much about you, here’s yet another reason to be so. The company’s new ‘Stay In the Loop’ feature ...
Americans Are Getting Freaked Out About Doing Stuff on the Internet
If you've started to think twice about what you type into a search engine or whether you should hit that Wi-Fi hotspot, you're not alone. Literally.
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
Paris Attack Could Renew Debate Over Encrypted Messaging Apps
The deadly terror attack in Paris could reignite the debate over whether the government should have a 'back door' to access encrypted communications. Law enforcement officials and cyberexperts have po...
What we know about the bank hacking ring - and who's behind it - Feb. 16, 2015
A few hackers have just pulled off the biggest bank heist ever: $1 billion stolen from 100 banks in 30 countries.
Google could end China's web censorship in 10 days – why doesn't it?
Google is too big for China to block. Just two simple steps and Eric Schmidt will have done something we can all celebrate
Internet censorship
Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet. It may be carried out by governments or by private organizations at the behest of gover...
Internet censorship - Wikipedia
Internet fraud
The use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them; for example, by stealing personal information, which can even lead to identity ...
Internet vigilantism
Internet vigilantism is the phenomenon of vigilantic acts taken through the Internet (the communication network or its service providers) or carried out using applications (World Wide Web, e-mail) tha...
Internet privacy
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Interne...
Internet privacy - Wikipedia
Spamming
Electronic spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. While the most wide...
Troll (Internet)
In Internet slang, a troll (/ˈtroʊl/, /ˈtrɒl/) is a person who sows discord on the Internet by starting arguments or upsetting people,by posting inflammatory, extraneous, or off-topic messages in an o...
Troll (Internet) - Wikipedia
List mining
List mining can be defined as the use, for purposes of scientific research, of messages sent to Internet-based electronic mailing lists. List mining raises novel issues in Internet research ethics. Th...
All the Ways Your Wi-Fi Router Can Spy on You
It can even be trained to read your lips.
Digital rights management
Digital rights management (DRM) is a class of technologies that are used by hardware and software manufacturers, publishers, copyright holders, and individuals with the intent to control the use of di...
Keyword stuffing
Keyword stuffing is considered to be an unethical search engine optimization (SEO) technique, which leads a website's being banned from major search engines either temporarily or permanently. Keyword ...
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
What we know about the bank hacking ring - and who's behind it - Feb. 16, 2015
A few hackers have just pulled off the biggest bank heist ever: $1 billion stolen from 100 banks in 30 countries.
E-mail spam legislation by country
The following table represents laws in respective countries which restrict the use of Email spam.Note: Countries marked with red are listed in the Spamhaus' Worst Spam Origin Countries.The following t...
Split tunneling
Split tunneling is a computer networking concept which allows a VPN user to access a public network (e.g., the Internet) and a local LAN or WAN at the same time, using the same physical network connec...
Anontune
Anontune is a proposal for a "fault-tolerant and open platform for social music" from Anonymous. Its current beta implementation allows users to create playlists of song titles which are then playable...