#unknown-identity

[ follow ]
#meta
fromTechCrunch
1 day ago
Social media marketing

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

EU data protection
fromTNW | Apps
3 days ago

Former Meta engineer probed over 30,000 private Facebook photos

A former Meta engineer is under investigation for extracting 30,000 private Facebook photos by bypassing security checks.
fromEngadget
4 days ago
EU data protection

UK Meta employee reportedly downloaded 30,000 private photos from Facebook users

Social media marketing
fromTechCrunch
1 day ago

PSA: If you use the Meta AI app, your friends will find out and it will be embarrassing | TechCrunch

Meta's Muse Spark AI model aims to revitalize its AI efforts amid concerns over past investments like the metaverse.
Law
fromBBC News
1 day ago

Meta pulls Facebook ads for social media addiction clients

Meta faces significant legal challenges over child safety and social media addiction lawsuits in the US.
EU data protection
fromTNW | Apps
3 days ago

Former Meta engineer probed over 30,000 private Facebook photos

A former Meta engineer is under investigation for extracting 30,000 private Facebook photos by bypassing security checks.
EU data protection
fromEngadget
4 days ago

UK Meta employee reportedly downloaded 30,000 private photos from Facebook users

A former Meta employee is under investigation for illicitly downloading 30,000 private photos from Facebook using software to bypass security.
Law
fromwww.bbc.com
1 day ago

Meta pulls Facebook ads recruiting for social media addiction lawsuits

Meta has removed law firm ads related to social media addiction, stating it won't allow profit from harmful claims.
Privacy professionals
fromwww.bbc.com
4 days ago

Ex-Meta worker investigated for downloading 30,000 private Facebook photos

A former Meta employee is under investigation for downloading 30,000 private Facebook images using a program to bypass security checks.
fromPopular Science
12 hours ago

How to stop your smart TV from tracking you

Smart TVs are capable of tracking user data, including viewing habits and app usage, which can lead to personalized advertising and content recommendations. Users may prefer to limit this tracking to protect their privacy.
Privacy technologies
#ai
Information security
fromFortune
1 day ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Artificial intelligence
fromFast Company
14 hours ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromFortune
1 day ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromPsychology Today
1 day ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
#social-media
Film
fromKotaku
8 hours ago

New Faces of Death A Fun Stab At Grisly State Of Social Media

The proliferation of graphic content online, especially among children, highlights the disturbing impact of social media on society.
Digital life
fromThe New Yorker
2 days ago

What the Verdict Against Meta and Google Says About the Way We Live Now

A California jury found Meta and Google liable for a woman's addiction to social media, marking a significant shift in legal accountability for tech companies.
Social media marketing
fromSilicon Canals
2 days ago

Psychology says people who never post on social media but check it every day aren't passive - they opted out of the performance while keeping the window, and keeping the window without paying the price is the most rational position available and the one the platform was specifically designed to make feel antisocial - Silicon Canals

Silent scrollers on social media actively choose to observe rather than post, demonstrating discipline and self-control contrary to common perceptions.
Social media marketing
fromHer Campus
2 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Privacy technologies
fromFox News
2 weeks ago

5 simple tech tips to take back control of your social media

Social media platforms collect extensive data, but users can regain control through privacy settings and limiting data sharing.
Film
fromKotaku
8 hours ago

New Faces of Death A Fun Stab At Grisly State Of Social Media

The proliferation of graphic content online, especially among children, highlights the disturbing impact of social media on society.
Digital life
fromThe New Yorker
2 days ago

What the Verdict Against Meta and Google Says About the Way We Live Now

A California jury found Meta and Google liable for a woman's addiction to social media, marking a significant shift in legal accountability for tech companies.
Social media marketing
fromSilicon Canals
2 days ago

Psychology says people who never post on social media but check it every day aren't passive - they opted out of the performance while keeping the window, and keeping the window without paying the price is the most rational position available and the one the platform was specifically designed to make feel antisocial - Silicon Canals

Silent scrollers on social media actively choose to observe rather than post, demonstrating discipline and self-control contrary to common perceptions.
Social media marketing
fromHer Campus
2 days ago

They Knew, They Didn't Care, & We Are All Paying For It

Social media platforms like Instagram have been found liable for mental health damage to young users, with internal documents revealing harmful strategies targeting teens.
Privacy technologies
fromFox News
2 weeks ago

5 simple tech tips to take back control of your social media

Social media platforms collect extensive data, but users can regain control through privacy settings and limiting data sharing.
Roam Research
fromThe Hacker News
16 hours ago

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

Webloc is a global geolocation surveillance system used by various law enforcement agencies, providing access to data from millions of mobile devices.
Marketing
fromInc
15 hours ago

The Biggest Missed Opportunity in Social Media Has Nothing to Do With Marketing

Brands must transition from social listening to social doing to leverage insights for transformative action.
Silicon Valley
fromTechCrunch
6 hours ago

Sam Altman responds to 'incendiary' New Yorker article after attack on his home | TechCrunch

Sam Altman responded to a Molotov cocktail attack and a critical profile questioning his trustworthiness.
Media industry
fromWIRED
14 hours ago

How the Internet Broke Everyone's Bullshit Detectors

Synthetic media is reshaping information warfare, prioritizing speed and virality over accuracy in online content.
#cybersecurity
Information security
fromWIRED
1 day ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
fromZDNET
1 day ago
Information security

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

fromTechSpot
2 days ago
Information security

Hackers are turning home routers into tools to spy on Microsoft 365 users

fromArs Technica
3 days ago
Information security

Anthropic limits access to Mythos, its new cybersecurity AI model

Mythos has identified critical zero-day vulnerabilities, while Anthropic's AI model has shown both capabilities and risks in cybersecurity applications.
fromTechzine Global
3 days ago
Information security

Anthropic is testing the Mythos AI model for cybersecurity

Claude Mythos is a new frontier model by Anthropic with strong cybersecurity capabilities, focusing on both detecting and exploiting vulnerabilities.
Information security
fromWIRED
1 day ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
Information security
fromZDNET
1 day ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromTechSpot
2 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Information security
fromArs Technica
3 days ago

Anthropic limits access to Mythos, its new cybersecurity AI model

Mythos has identified critical zero-day vulnerabilities, while Anthropic's AI model has shown both capabilities and risks in cybersecurity applications.
Information security
fromTechzine Global
3 days ago

Anthropic is testing the Mythos AI model for cybersecurity

Claude Mythos is a new frontier model by Anthropic with strong cybersecurity capabilities, focusing on both detecting and exploiting vulnerabilities.
#artificial-intelligence
fromFairbanks Daily News-Miner
1 day ago
Business intelligence

Why AI Search Matters for Clients. How Brands Can Gain More Visibility, More Trust, and Better Conversion With the Right Strategy

AI Search is crucial for business growth, impacting customer acquisition, brand trust, and visibility in a digital landscape.
Psychology
fromPsychology Today
1 week ago

AI Doesn't Flatter You: It Does Something Worse

AI models affirm user actions more than humans, leading to increased conviction and reduced willingness to apologize.
Business intelligence
fromFairbanks Daily News-Miner
1 day ago

Why AI Search Matters for Clients. How Brands Can Gain More Visibility, More Trust, and Better Conversion With the Right Strategy

AI Search is crucial for business growth, impacting customer acquisition, brand trust, and visibility in a digital landscape.
Psychology
fromPsychology Today
1 week ago

AI Doesn't Flatter You: It Does Something Worse

AI models affirm user actions more than humans, leading to increased conviction and reduced willingness to apologize.
Health
fromWIRED
1 day ago

Meta's New AI Asked for My Raw Health Data-and Gave Me Terrible Advice

Medical experts express concerns about uploading personal health data to AI models due to privacy and control issues.
US politics
fromwww.mediaite.com
22 hours ago

Trump Administration Demands Reddit Reveal Identity of User Who Criticized ICE

The Trump administration ordered Reddit to provide personal information on a user criticizing ICE, raising First Amendment concerns.
Writing
fromDefector
1 day ago

Why Would You Ask AI To Tell The Story Of Your Own Life? | Defector

Writing is a challenging profession with many aspiring writers and few opportunities for steady income.
Apple
fromTheregister
2 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Data science
fromPsychology Today
2 days ago

Is Algorithmic Asymmetry Reshaping How We Think?

Algorithmic asymmetry creates unequal access to information and decision-making, impacting individuals across various aspects of life.
Parenting
fromHigh Country News
1 day ago

Opting out could be the thing that sets you free - High Country News

Marigold, age 4, insists she no longer needs naps, claiming she's a big kid now, while her mother struggles to find rest amidst her busy life.
Cryptocurrency
fromFortune
3 days ago

The New York Times says it found Satoshi Nakamoto, the inventor of Bitcoin. Not so fast. | Fortune

John Carreyrou claims to have identified Satoshi Nakamoto as British computer scientist Adam Back through circumstantial evidence and business activities.
Mental health
fromwww.theguardian.com
4 days ago

I felt ashamed and scared': how an online friendship became a sextortion nightmare

Online friendships can lead to severe risks, including sextortion, which can have devastating emotional consequences.
UX design
fromEntrepreneur
4 days ago

The Hidden Risk Behind Every 'Frictionless' Digital Experience

Digital experiences should prioritize human agency over pressure tactics to foster trust and informed decision-making.
Marketing tech
fromForbes
4 days ago

4 Ways To Stay Authentic In The Age Of AI

Consumer backlash against AI in advertising stems from a perceived lack of authenticity, not the technology itself.
#google
Privacy professionals
fromBloomberglaw
1 day ago

Splintered Video Privacy Rulings Won't Be Fixed by Supreme Court

The Supreme Court's review of the VPPA may clarify the definition of 'consumer' but won't resolve circuit splits on personally identifiable information.
Law
fromAbove the Law
1 day ago

Understanding AI Hallucinations: Making Sure You Don't End Up At The Wrong Stop - Above the Law

Understanding GenAI's predictable failures is crucial for legal professionals to avoid hallucinations and inaccuracies in legal outputs.
Media industry
fromTechCrunch
2 days ago

EFF is the latest organization to leave X | TechCrunch

X's declining engagement has led the EFF to leave the platform after nearly 20 years due to significantly reduced post visibility.
Silicon Valley
fromwww.theguardian.com
4 days ago

Porn, dog poo and social media snaps: the taskers' scraping the internet for Meta-owned AI firm

Scale AI, part-owned by Meta, employs thousands to train AI using personal data from social media, raising ethical concerns about data scraping.
UX design
fromSmashing Magazine
5 days ago

Identifying Necessary Transparency Moments In Agentic AI (Part 1) - Smashing Magazine

Designing for agentic AI requires balancing transparency and simplicity to build user trust without overwhelming them with information.
Photography
fromWIRED
1 week ago

Your Photos Are Probably Giving Away Your Location. Here's How to Stop That

Photos contain metadata like EXIF data, including location, which can be useful but may compromise privacy when shared.
#data-privacy
Privacy technologies
fromArs Technica
3 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
Privacy technologies
fromArs Technica
3 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
fromThe Verge
1 day ago

Gen Z's love-hate relationship with AI

Gen Z isn't rejecting AI outright, but they are reassessing its role in their lives. What we're seeing in the data is a generation that recognizes AI's utility but is increasingly concerned about its long-term impact on learning, trust and career readiness.
Artificial intelligence
Law
fromArs Technica
1 day ago

Trump admin hounds Reddit to reveal identity of user who criticized ICE

Grand jury proceedings are secretive and primarily used to investigate federal crimes, raising concerns about free speech protections.
Privacy professionals
fromTechCrunch
1 day ago

Stalking victim sues OpenAI, claims ChatGPT fueled her abuser's delusions and ignored her warnings | TechCrunch

A lawsuit claims OpenAI's technology enabled harassment, as a user allegedly stalked his ex-girlfriend after believing he found a cure for sleep apnea.
fromThe Verge
4 days ago

The case for banning cookie banners

Cookie banners have become bloated and useless, creating a new kind of interaction that means trouble all over the web. The only solution is to get rid of them, and do it now.
Digital life
Privacy technologies
fromThe Hacker News
1 day ago

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google's Device Bound Session Credentials enhance security for Chrome users by tying authentication sessions to specific devices, combating session theft.
#linkedin
Privacy professionals
fromComputerworld
2 days ago

Questions raised about how LinkedIn uses the petabytes of data it collects

LinkedIn users should limit identifiable data exposure and treat the platform as potentially hostile until BrowserGate allegations are verified.
Law
fromArs Technica
3 days ago

LinkedIn scanning users' browser extensions sparks controversy and two lawsuits

LinkedIn faces lawsuits alleging lack of user consent for data collection practices.
Privacy technologies
fromTNW | Insights
6 days ago

LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device

LinkedIn's hidden JavaScript routine collects extensive user data without disclosure, raising concerns about covert surveillance practices.
Privacy professionals
fromComputerworld
2 days ago

Questions raised about how LinkedIn uses the petabytes of data it collects

LinkedIn users should limit identifiable data exposure and treat the platform as potentially hostile until BrowserGate allegations are verified.
Law
fromArs Technica
3 days ago

LinkedIn scanning users' browser extensions sparks controversy and two lawsuits

LinkedIn faces lawsuits alleging lack of user consent for data collection practices.
Privacy technologies
fromTNW | Insights
6 days ago

LinkedIn secretly scans 6,000+ browser extensions and fingerprints your device

LinkedIn's hidden JavaScript routine collects extensive user data without disclosure, raising concerns about covert surveillance practices.
#digital-privacy
Privacy technologies
fromZDNET
4 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
4 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
4 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy technologies
fromZDNET
4 weeks ago

How to delete or hide yourself from the internet - 11 effective ways (and most are free)

Digital privacy requires constant attention as personal data persists online long after deletion, affecting career, reputation, and relationships through old posts, photos, and search history exploitation.
Privacy professionals
fromWIRED
3 days ago

Men Are Buying Hacking Tools to Use Against Their Wives and Friends

Telegram groups facilitate the sale of hacking and surveillance services, promoting abusive content targeting women and girls.
Digital life
fromBig Think
1 week ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Social media marketing
fromPR Daily
2 days ago

A landmark ruling is reshaping social media. Communicators should pay attention. - PR Daily

A court ruling holds social media platforms accountable for addictive designs impacting user mental health.
Information security
fromThe Hacker News
1 day ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
Privacy professionals
fromZDNET
1 week ago

I turned to PrivacyBee to clean up my data - here's how it made me disappear

PrivacyBee is preferred for its comprehensive data removal services and user-friendly management tools.
Information security
fromThe Hacker News
3 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Privacy professionals
fromHer Campus
1 week ago

Who's Watching The Watchers? AI, Age Verification, And Online Privacy

Parents are increasingly concerned about children's exposure to harmful online content despite regulations like CIPA and platforms like YouTube Kids.
Information security
fromThe Hacker News
4 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#online-privacy
Privacy technologies
fromZDNET
3 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy professionals
fromwww.bbc.com
1 month ago

We have more privacy controls yet less privacy than ever

Young people increasingly view online privacy as inevitable loss rather than a right, accepting data sharing as currency for digital services while older privacy advocates warn this threatens fundamental freedoms.
Privacy technologies
fromZDNET
3 weeks ago

You're being tracked online - 9 easy ways to stop the surveillance

Reducing online tracking is possible through careful browser choice, VPNs, and anti-tracking software.
Privacy professionals
fromwww.bbc.com
1 month ago

We have more privacy controls yet less privacy than ever

Young people increasingly view online privacy as inevitable loss rather than a right, accepting data sharing as currency for digital services while older privacy advocates warn this threatens fundamental freedoms.
fromPsychology Today
2 months ago

Anonymity and the Erosion of Kindness

Throughout the year, we all have particular events that mark the passage of time. Birthdays, holidays, special events. As professors, we have a few unique days too: some fun, some not. There's the first day of classes, where we still (20+ years in) get the jitters. The last day of classes, when we are often just as, if not more excited, than the students. And then there is the day our course evaluations arrive.
Higher education
Privacy technologies
fromenglish.elpais.com
4 weeks ago

AI ends online anonymity: the ease of unmasking pseudonymous accounts

Artificial intelligence language models can identify 68% of anonymous social media users with 90% precision, fundamentally undermining online anonymity and privacy protections.
Privacy technologies
fromTech Times
4 weeks ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
Privacy professionals
fromthenextweb.com
1 month ago

Unmasking the illusion of safety online

Personal cybersecurity responsibility is essential as cybercrime costs billions annually, with social media amplifying vulnerabilities through voluntary data sharing and AI-enabled threat analysis.
Privacy professionals
fromZDNET
1 month ago

How to clean up your digital footprint - and why it matters more than you think

Abandoned social media accounts and old posts create digital vulnerabilities requiring regular maintenance to protect reputation and prevent identity theft or fraud.
Privacy technologies
fromwww.theguardian.com
1 month ago

AI allows hackers to identify anonymous social media accounts, study finds

Large language models enable malicious actors to efficiently de-anonymize social media users by matching anonymous accounts to real identities using publicly available information.
#ai-deanonymization
Privacy technologies
fromFuturism
1 month ago

AI Can Mass-Unmask Pseudonymous Accounts, Research Paper Finds

AI language models can now easily deanonymize pseudonymous internet users at scale, successfully unmasking two-thirds of tested users across multiple platforms.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Privacy technologies
fromFuturism
1 month ago

AI Can Mass-Unmask Pseudonymous Accounts, Research Paper Finds

AI language models can now easily deanonymize pseudonymous internet users at scale, successfully unmasking two-thirds of tested users across multiple platforms.
Privacy technologies
fromThe Verge
1 month ago

AI can unmask your secret accounts

AI systems can effectively deanonymize online accounts by analyzing writing patterns and biographical details at scale, outperforming traditional computational techniques.
Privacy technologies
fromTheregister
1 month ago

AI takes a swing at online anonymity

Large language models can efficiently deanonymize internet users across multiple platforms by automating the process of connecting anonymous posts to identify individuals with high precision.
Privacy professionals
fromDataBreaches.Net
2 months ago

A faceless hacker stole my therapy notes - now my deepest secrets are online forever - DataBreaches.Net

The theft of 33,000 Vastaamo psychotherapy records exposed victims to extortion, public disclosure of sensitive therapy details, and enduring psychological and privacy harm.
Information security
fromEmptywheel
2 months ago

"Tor Stinks" ... because It Requires Manual (Digital) Tails

Tor resists systematic de-anonymization; NSA can de-anonymize only a very small fraction manually and cannot reliably combine Tor attacks with passive SIGINT.
Privacy technologies
fromFox News
2 months ago

5 tech terms that shape your online privacy

Limit app permissions, especially location, microphone, and photo access, and regularly adjust device privacy settings to prevent background data collection.
fromArs Technica
1 month ago

Upgraded Google safety tools can now find and remove more of your personal info

There are people on the Internet who want to know all about you! Unfortunately, they don't have the best of intentions, but Google has some handy tools to address that, and they've gotten an upgrade today. The "Results About You" tool can now detect and remove more of your personal information. Plus, the tool for removing non-consensual explicit imagery (NCEI) is faster to use. All you have to do is tell Google your personal details first-that seems safe, right?
Privacy technologies
[ Load more ]