Like Google, Facebook places great importance on advertising. The social network not only earns money from ads itself, but also allows companies and individuals to do so by displaying ads in videos. Pirates were quick to spot an easy way to earn money -- steal someone else's popular video and watch the ad revenue roll in.
Now Facebook is fighting back in a way that has already been used to some extent by YouTube. There is a new "claim ad earnings" option in the Rights Manager tool which enables the owner of a particular video to bag the ad revenue when their material is pirated. But the update to Rights Manager are more far-reaching than this.
It's something that many people have expected for some time, and now we know that it's true. Facebook has admitted that governments around the world have used the social network to spread propaganda and try to influence the outcome of elections.
In the run-up to the US election, there was speculation that powerful groups had been making use of Facebook to influence voters by spreading fake news. Now, in a white paper, Facebook reveals that through the use of fake accounts, targeted data collection and false information, governments and organizations have indeed been using the social network to control the news, shape the political landscape, and create different narratives and outcomes.
Most Commented Stories
Today in Tech History
A hacking group by the name of TheDarkOverlord has leaked the first episode of the Netflix show Orange is the New Black [Update: the group has since leaked 9 more episodes]. The season premiere of the hit show is not set to air until June, but TheDarkOverlord released it to The Pirate Bay after Netflix failed to meet ransom demands.
The group allegedly managed to get hold of the episode after gaining access to the systems of post-production studio Larson Studios in Hollywood. When Netflix refused to comply with its demands, which are described as "modest", the show was made available for BitTorrent users.
The government is supposed to work for the people, but sometimes, it can feel like it is against them. In a democratic country like the USA, where many officials are elected by citizens, you would think this wouldn't be the case, but sadly, it often is. As Edward Snowden revealed in his leaks, the US government has programs where it spies on its own people, doing things like scanning and reading their emails.
Today, the National Security Agency announces -- somewhat begrudgingly -- that it will stop the collection of some American emails that simply mention known foreign targets. It will instead only collect communications to and from the target directly. While this is a big win for the privacy of American people, the NSA is seemingly implying that it could have negative implications for safety. In fact, the agency tries very hard to distance itself from any wrongdoing by making it clear that the reading of these emails were legal and allowed.
Anyone would think zero-day attacks are unpreventable following a recent claim from one leading cyber-security vendor. FireEye this year claimed to have discovered "29 of the last 53 zero-day attacks." 24 exploits remained undetected, yet this was still presented as some kind of monumental achievement. Such a statement leaves little comfort for the businesses who found themselves victims, so is it time to just give up completely and let the cyber criminals take over?
It certainly feels that way, even while threats intensify and Locky ransomware rears its ugly head in new forms with renewed malevolence.
AI, or artificial intelligence, is becoming increasingly prevalent in today’s society, but many people don’t realize there are actually four distinctive types of artificial intelligence.
Keep reading to discover the types of AI and the differences among them and examples of how you might see each one play out in real-life scenarios.
Two years ago the FTC released a report on the Internet of Things that recommended a series of concrete steps that businesses take to enhance and protect consumers’ privacy and security. Yet not much has changed. As people continue to reap the benefits from a growing world of Internet-connected devices, we’re still seeing security problems with devices in the home. It’s essential that manufacturers know where to begin when they develop software, especially consumer-focused companies.
I recently joined the millions of consumers entangled in the Internet of Things by adding a smart thermostat and solar panels to my home. The good news is I’ve already been able to help reduce my electricity usage. The bad news is that, as a security professional, I worry about the security of the devices in my house, the systems they communicate with and the chain of custody for my personal data.
Microsoft intended to include its new My People sharing and communication app in the Windows 10 Creators Update, but had to postpone it because it simply stood no chance of being ready in time.
The revised plan is to include it in the next major Windows 10 update, codenamed Redstone 3, and if you want to take it for a spin, the good news is it is now possible to do so as it makes an appearance in the latest Windows Insider release, Build 16184.
When it comes to meeting future demands, IT leaders in the UK are lagging behind those in Germany and the US. This is according to a new report by Brocade, entitled Global Digital Transformation Skills Study. The report is based on a survey of 630 IT leaders in the US, UK, France, Germany, Australia and Singapore.
It says that organizations are "at a tipping point" -- a point in time when technology demands are just about to outstrip the skills supply. Consequently, those that train their staff now and prepare for the future in that respect are the ones that are setting themselves up for a successful future.
With PC gaming still hugely popular, more and more companies are looking to create their own peripherals. As a result, there are countless mechanical keyboards on the market nowadays. I recently reviewed the Logitech G413 which offers amazing value.
Today, popular memory-maker G.SKILL unveils its latest mechanical keyboard -- the RIPJAWS KM560 MX. As the name suggests, it uses Cherry MX switches, and consumers can choose between red, blue, and brown. It is very similar to the company's KM570 model with one big exception -- it is tenkeyless. This means it is lacking the numberpad that is found on most keyboards. In fact, G.SKILL says this will save about 8cm, making it a good choice for those that need desk space.
Innovation & Tech Today is an award-winning business and science title which features fascinating content, interviews, and product reviews from across a variety of sectors including: STEM, Home Automation, Wearables, Energy and Transportation, Medical Tech, Business Innovations, Gaming and Entertainment, and Sustainability.
Each quarterly issue has over 160 pages, perfectly bound, with rich and enticing photography. Exclusive interviews and stories with names like, Scarlett Johansson, Kevin Hart, Akon, Dr. Michio Kaku, Bill Nye, Neil deGrasse Tyson, Mark Cuban, and more. Go behind the scenes of innovation, must have gifts, and much more.
If you’re looking to revisit a website later then the obvious solution is to bookmark it. That’s easy, but won’t help much if you forget about the link, or where you saved it.
Open Me Later! is a free Chrome extension which enables scheduling a page to open automatically, as the date and time you specify.
Four out of five business leaders think their industry will get positively disrupted by digital transformation within the next three years. This is according to a new report recently released by Microsoft and Harvard Business Review Analytic Services.
"A vast majority (80 percent) of the 783 survey respondents believe their industry will be disrupted by digital trends," the report states. "And most of those (84 percent) said their industry has either passed the inflection point of disruption or will pass it by 2020 -- just three years away."
Securing systems is essential, but many businesses continue to take a reactive approach to protection using dated tools and techniques.
A new report by technology trade association CompTIA highlights the need for companies to adopt proactive measures to identify weak links before they are exploited, broaden the security skills of their technology professionals, and implement top to bottom security training throughout the organization.
Two-hundred-and-twenty-eight in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 on the Windows Store in the past seven days.
This year's Build conference will feature the first Windows Developer Awards, and there are two categories for game and app creators. You can cast your vote and check out the nominated apps and games with a click on the link above.