Skip to main content
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Search
Content type:
Examples
IBM claims its i2 software can identify terrorists
1st December 2017
Content type:
Examples
Secret Uber "Greyball" programme undermines regulators
1st December 2017
Content type:
Examples
Hong Kong computes images from DNA samples to publicly shame litterbugs
1st December 2017
Content type:
Examples
Uber breaks Apple's iPhone rules
1st December 2017
Content type:
Explainer
What Is Privacy?
23rd October 2017
Content type:
Explainer
Social Media Intelligence
23rd October 2017
Content type:
Examples
Facial recognition fails at forensic reliability
3rd December 2017
Content type:
Examples
Personalised online ads enables invisible - and illegal - discrimination
3rd December 2017
Content type:
Examples
Beijing installs facial recognition to deter toilet paper theft
3rd December 2017
Content type:
Examples
FBI facial recognition database proceeds without oversight
3rd December 2017
Content type:
Examples
Databases of facial images proliferate
1st December 2017
Content type:
Examples
Facial payment systems develop apace in China
1st December 2017
Content type:
Examples
As Finland freezes DDoS attack paralyses heating systems
1st December 2017
Content type:
Examples
Swedish hub offers workers microchip implants to replace access control and credit cards
1st December 2017
Content type:
Examples
Data breach exposes Wonga customers in the UK and Poland
1st December 2017
Content type:
Examples
London Metropolitan Police unit caught spying on activists and journalists
1st December 2017
Content type:
Examples
Garadget punishes complaining customer with lockout
1st December 2017
Content type:
Examples
Cheap phones leave poorer users vulnerable
1st December 2017
Content type:
Examples
Facebook research targeted insecure youth
1st December 2017
Content type:
Examples
Fitbit data tests murder suspect's alibi
1st December 2017
Content type:
Examples
Internet of Things provides new tools for domestic abusers
1st December 2017
Content type:
Examples
Lawsuit alleges that Bose headphones spy on users
1st December 2017
Content type:
Examples
Jharkhand government website leaks personal details of 1 million Aadhaar subscribers
1st December 2017
Content type:
Case Study
Case Study: Smart Cities and Our Brave New World
30th August 2017
Content type:
Case Study
Case Study: Super-Apps and the Exploitative Potential of Mobile Applications
30th August 2017
Content type:
Case Study
Case Study: The Myth of Device Control and the Reality of Data Exploitation
30th August 2017
Content type:
Case Study
Case Study: Connected Cars and the Future of Car Travel in the Digital Age
30th August 2017
Content type:
Case Study
Case Study: Profiling and Elections - How Political Campaigns Know Our Deepest Secrets
30th August 2017
Content type:
Case Study
Case Study: Fintech and the Financial Exploitation of Customer Data
30th August 2017
Content type:
Case Study
Case Study: The Gig Economy and Exploitation
30th August 2017
Pagination
Current page
1
Page
2
Next page
››
Last page
Last »
Get Involved
Act with Us
Donate
Join