Internet ethics
Cyberethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.
In the lat...
YouTube mistakenly shuts down conservative channels, videos
Kairos CEO Ankur Jain on the European Union issuing strict guidelines for tech companies' handling of terror content and how Rhino helps renters avoid security deposits.
Report: Facebook Has “An Army Of Filipinos” Policing Offensive Content For £1.81/hr – MILO NEWS
He searches the world for the cheapest labor possible and than wants the government to pay a minimum income. The hypocracy is astounding.
Zuckerberg Says Facebook Plans To Crack Down On Fake News
Facebook founder Mark Zuckerberg released a statement on how his company is working to mitigate fake news.
Why Is Typo Hashtag #HillaryForPrision Trending On Twitter?
Hashtag #HillaryForPrision began trending on Twitter Monday morning — and no, this writer didn’t just strike a typo on his MacBook Air.
All the Ways Your Wi-Fi Router Can Spy on You
It can even be trained to read your lips.
Google Can Now Tell You When And Where You Were Mentioned Online
The company's new Stay In The Loop feature does just that. If you weren’t scared that Google knows too much about you, here’s yet another reason to be so. The company’s new ‘Stay In the Loop’ feature ...
Americans Are Getting Freaked Out About Doing Stuff on the Internet
If you've started to think twice about what you type into a search engine or whether you should hit that Wi-Fi hotspot, you're not alone. Literally.
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
Paris Attack Could Renew Debate Over Encrypted Messaging Apps
The deadly terror attack in Paris could reignite the debate over whether the government should have a 'back door' to access encrypted communications. Law enforcement officials and cyberexperts have po...
What we know about the bank hacking ring - and who's behind it - Feb. 16, 2015
A few hackers have just pulled off the biggest bank heist ever: $1 billion stolen from 100 banks in 30 countries.
Google could end China's web censorship in 10 days – why doesn't it?
Google is too big for China to block. Just two simple steps and Eric Schmidt will have done something we can all celebrate
Internet censorship
Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet. It may be carried out by governments or by private organizations at the behest of gover...
Internet censorship - Wikipedia
Internet fraud
The use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them; for example, by stealing personal information, which can even lead to identity ...
Internet vigilantism
Internet vigilantism is the phenomenon of vigilantic acts taken through the Internet (the communication network or its service providers) or carried out using applications (World Wide Web, e-mail) tha...
Internet privacy
Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Interne...
Internet privacy - Wikipedia
Spamming
Electronic spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. While the most wide...
Troll (Internet)
In Internet slang, a troll (/ˈtroʊl/, /ˈtrɒl/) is a person who sows discord on the Internet by starting arguments or upsetting people,by posting inflammatory, extraneous, or off-topic messages in an o...
Troll (Internet) - Wikipedia
Internet Architecture Board
The Internet Architecture Board (IAB) is the committee charged with oversight of the technical and engineering development of the Internet by the Internet Society (ISoc). It oversees a number of Task ...
Doorway page
Doorway pages are web pages that are created for spamdexing. This is for spamming the index of a search engine by inserting results for particular phrases with the purpose of sending visitors to a dif...
All the Ways Your Wi-Fi Router Can Spy on You
It can even be trained to read your lips.
Freedom of information
Freedom of information is an extension of freedom of speech, a fundamental human right recognized in international law, which is today understood more generally as freedom of expression in any medium...
Email authentication
Email authentication is a collection of techniques aimed at equipping messages of the email transport system with verifiable information. It is a coarse-grained authentication, usually at Administrat...
Email authentication - Wikipedia
Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC
Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including ph...
Pump and dump
"Pump and dump" (P&D) is a form of microcap stock fraud that involves artificially inflating the price of an owned stock through false and misleading positive statements, in order to sell the chea...
What we know about the bank hacking ring - and who's behind it - Feb. 16, 2015
A few hackers have just pulled off the biggest bank heist ever: $1 billion stolen from 100 banks in 30 countries.
Anontune
Anontune is a proposal for a "fault-tolerant and open platform for social music" from Anonymous. Its current beta implementation allows users to create playlists of song titles which are then playable...