Facebook and Instagram's "Oversight Board" received more than a million complaints about content moderation in its first year. But it investigated fewer than 100 and made public rulings in just 20 cases. The board is made up of independent members ... who have industry expertise but aren't connected to Meta, the company which owns both Facebook and Instagram. It has the power to rule on content moderation decisions, with the sites having to follow its judgment. It can also make recommendations for policy changes. Of the 1.1 million appeals from users, most involved content moderation for bullying ... (view more)
Featured Articles
What's one of the best one-stop video editing software available for both PC and Mac? Answer: Digiarty's VideoProc Converter! From the makers of WinX DVD Ripper and WinX Video Converter comes VideoProc Converter: a multi-award winning software ... program that is a one-stop video processing program that allows you to convert video/audio, rip DVDs, edit video, download videos, video to GIF maker ... plus much more! Note: near the end of the article I've included a link to a FREE version of VideoProc Converter, plus a chance to win prizes. -- VideoProc Converter: Features Overview A Simple to use, ... (view more)
Phones and tablets sold in Europe from 2024 may need to use USB-C charging ports in a blow to Apple. The rules could affect handsets around the world depending on how manufacturers respond. The rules would come through a European Union directive, ... which means all 27 EU countries would need to pass the measures into their national laws. Although the draft directive has been published, they won't take force until the European Parliament has voted to adopt them. The logic is that the rules would let users have a single charger for all small portable devices, including any new ones they buy. That' ... (view more)
Password manager LastPass will let users prove their identity with a biometric login rather than a master password. It could overcome one of the off-putting points for some users. Like most password managers, LastPass lets users store passwords for ... other websites in a secure vault that's encrypted in a way that means even LastPass itself can't access the information. It's protected with a master password that gives the service its name, the logic being it's the last password a user will ever need to remember. That does mean the master password needs a bit of a Goldilocks quality. It needs to ... (view more)
Three cyber security experts say proposals to scan user devices for illegal material will do more harm than good. They've condemned European proposals to deal with illegal collection of child abuse images. The argument is about "client-side ... scanning" which means looking for images or other material on a user's device, rather than waiting until the images are uploaded to the Internet. It's a controversial practice that Apple has previously explored. It appears to have dropped plans to scan iPhones to look for specific images that matched a database in which children were abused. Although Apple ... (view more)
The Supreme Court has blocked a Texas law that would have stopped social media companies from banning users based on political views. A 5-4 majority of judges said the law violated the First Amendment. In this case, the right to free speech in ... question is not that of individual users, but that of the social media companies. They had argued that they have the right to decide what content does and doesn't appear on their platforms. The verdict doesn't throw the law out. Instead, it means it cannot take effect until ongoing lawsuits about its measures have been resolved. Because it was an ... (view more)
Are you being blackmailed online? Are blackmailers threatening to expose you through Facebook, Instagram, or LinkedIn? If so, you've come to the right place. You may Contact me here using the contact form now, or keep reading to learn how I can ... help. The information below is based on two years of my own research and not regurgitated, useless information pulled from another site. If you want all the answers, read the entire article in full. IMPORTANT: If you paid the scammers anything at all, they will simply turn around and ask for more . This is how this scam goes 100% of the time. Don't be ... (view more)
Russia's government has reportedly spent $10 million bypassing its own bans on foreign websites. The country has blocked citizens from accessing more than 1,500 since invading Ukraine. The figures come from Top10VPN, a site that compares the ... features of virtual private networks. These are tools that let users access sites in a way sometimes compared to routing Internet traffic through a tunnel so that nobody can see who has connected to which site. VPNs can get round official blocks on accessing specific sites, particularly when they are policed by Internet providers following local laws. ... (view more)
The next major update to Windows 11 should be going public in the not-too-distant future. The 22H2 update has reached its final testing stage. The name might suggest it's the second of the usual two main updates to Windows 11 released each year. In ... fact the pace of change has slowed so much that there was no Windows 11 22H1 release, and instead 22H2 is the only major update expected this year. The update has now reached the third and final "channel" of the Windows Insiders test program that lets people access updates early. The Dev channel is used for all prospective changes to Windows, ... (view more)
The Federal Trade Commission (FTC) has fined Twitter $150 million for unlawfully giving personal data to advertisers. The fine is so high because Twitter breached a settlement in a 2011 case. Back then, hackers broke into Twitter and were able to ... access personal information, including messages that users had set as private. The FTC said then that Twitter had misled users by making promises about how secure and private they kept user data. At that time, Twitter escaped any penalty but accepted a "consent agreement" to settle the case. That wasn't an admission of wrongdoing, but did mean ... (view more)
Nearly half of all leading websites are vulnerable to an audacious hacking method according to a new report. The attacks involve hijacking an account before it has even been created. The scam uses various methods, but usually involves creating an ... account using an email address, then waiting for the actual owner of that email address to attempt to create an account on a specific website. Microsoft's Andrew Paverd and independent researcher Avinash Sudhodanan detailed the problems in a research paper and blog post. (Source: microsoft.com ) They say the "root cause" of the problem is that many ... (view more)
Apple is to let app developers raise subscription prices without users actively accepting the hike. It's a reversal of the current opt-in system for increases. The move affects subscription apps which most commonly involve music and video streaming ... services and digital magazines. At the moment, developers can automatically charge customers at regular intervals until the customer cancels. However, if the developer wants to put the price up, they'll need to show a message clearly marked "Agree to New Price." If the customer doesn't tap on this button, their subscription automatically ... (view more)
A former Facebook content moderator is suing the site's operators claiming the work mentally harmed him. Daniel Motaung says the low-paid work left him with post-traumatic stress disorder. Motaung is suing Facebook's owner Meta along with Sama, the ... contracting company that hired him for the work. He says he was misled by a job ad that implied content moderation was a small part of a wider customer service role. He was recruited in South Africa and relocated to work in Nairobi where he was paid the equivalent of $2.20 an hour. He says this relocation made it more difficult for himself and ... (view more)
The most recent Windows 11 update has caused bugs so significant that some users may be better off uninstalling it, despite the security implications. It's a situation with some particularly embarrassing elements for Microsoft. The update has the ... code name KB5013943 and was released to the general public on May 10th. It's reported some users in Microsoft's test program who got the update early experienced problems, meaning it's a surprise the same bugs appear to still have been present in the general release. Compatibility Glitches The problem is with the .NET Framework. That's effectively a ... (view more)
Facebook is to ditch some tools which tracked a user's location. It seems to be more about the tools being little used than a sudden interest in boosting privacy. The tools all involved tracking a user's location in real time and using the ... information to provide some sort of service. Perhaps the best known was "Nearby Friends" which lived up to its name, telling users if anyone they knew on Facebook (or at least anyone who also had the feature switched on) was in the area, allowing for semi-spontaneous meet-ups. The tools also included localized weather alerts. In both cases, many users ... (view more)
Google is making it easier to change passwords on an Android device after a security breach. It's automating much of the process through the Google Assistant feature. It works with the saved passwords tool on Chrome, which can automatically fill in ... user names and password fields on websites. The passwords themselves are then stored securely in the user's Google account, which is one of the reasons it's so important to keep the Google password secure. On both desktop and mobile devices, Chrome can already warn users if their saved login details for a particular site is known to have been ... (view more)
Twenty US Internet providers have agreed to offer low-cost Internet plans to people on lower incomes. The deal combines with government subsidies to mean many people will get free broadband. Following the recent infrastructure bill passing, the ... federal government now offers a subsidy of $30 taken off broadband bills for around 48 million households. The Affordable Connectivity Program covers low income households, plus those with people eligible for public programs such as Medicaid and veterans pensions. More than 11.5 million people have already claimed the subsidy. (Source: yahoo.com ) The ... (view more)
Google is making it easier for people to remove web pages with their personal contact details from search results. It won't remove them from web pages, but may make it less likely people will come across them. The policy makes information less ... visible in two ways. Firstly, it stops it appearing on the search results page through the extracts from the relevant pages. Secondly, it may make it less likely the page that hosts the content will appear in a search result. While Google is legally required to remove some personal information from search results under European privacy laws, it goes a ... (view more)
The end of brick-like chargers that only fit one laptop is a step closer. The first USB cables that can carry up to 240 watts of power are now in production. For many years, one of the biggest drawbacks of laptops was the charger. In most cases they ... were considerably thicker than the laptop itself. They were also usually specific to the device (both in the plug/socket size and in the specific amount of power delivered). That meant somebody who lost or broke their charger would often face delay and expense before they could charge their device again. Things got a little better with the ... (view more)
Microsoft Edge is getting what looks suspiciously like a virtual private network (VPN). It comes with a catch and requires some serious trust in Microsoft. The "Secure Network" feature is now mentioned in a support document and has also shown up in ... Edge for some users who've signed up for early access to in-development features. It appears to be a variant of a VPN, which involves routing internet connection through a VPN provider. The data traveling back and forth between the provider and the user is encrypted in a setup likened to a "tunnel" that stops it being accessible ... (view more)
Google has started including detailed privacy information about the Android apps in the official Play Store. It's up to developers to fill out the details and Google won't be checking them in advance. The listings page for each app will now have a ... summary box listing key data privacy and security details. Users can then click or tap through to see more detailed information. The box will note how many types of data the app collects, whether it is stored in encrypted form, and whether user can easily delete it. It will also list if the developer has put the app through an independent privacy ... (view more)
For the first time, more than five billion people use the Internet. That means the proportion of the world who are online will soon reach two-thirds. The figures come from Data Reportal, which gathers together information from multiple sources to ... produce a global estimate. (Source: datareportal.com ) Its headline figures include five billion people using the Internet, meaning 63 percent of the world's population. It also says 5.32 billion people have a mobile phone (67 percent of the population), with around 80 percent of those handsets being smartphones. (Source: bdaily.co.uk ) The report ... (view more)
Two separate reports point to a spike in zero-day bugs . That's when would-be attackers trying to exploit a bug have a head-start over developers who are trying to fix and patch it. When software developers discover a security vulnerability (or are ... told about it by responsible researchers), they are in a race against time to find and roll out a fix before attackers discover it and start trying to take advantage. Often they'll only have a matter of days. A zero-day bug is defined as one whose existence is (or was) discovered by hackers before it is known to the software developers. That means ... (view more)
Six months in, Windows 11 doesn't appear to be attracting a rush of new users. While claims that it's less popular than XP look a little shaky, the adoption rate appears to have slowed significantly. Only Microsoft knows exactly how many people are ... running various versions of Windows, but numerous independent studies attempt to estimate the figures. This usually involves extrapolating from a sample of users whose operating system is identifiable, for example when they visit a website or use a particular application. The most eye-catching recent estimate comes from a company called Lansweeper ... (view more)
Google users have reported an unexpected message saying their account is about to be shut down. It looks like a phishing scam but appears to actually be a bug in Google systems. The reports came in a Google support thread that has now been deleted. ... More than 300 people "upvoted" the original posts, suggesting they had a similar experience. The users were confused as they received an email saying "Your Google Account will soon be considered inactive" and that if they didn't log in it would be classed as having not been used for 18 months. That was a major surprise to users ... (view more)
An American man who helped North Korea evade US sanctions through cryptocurrencies has received a jail sentence of more than five years. Virgil Griffith had visited Pyongyang to tell officials how to use digital currencies. He pleaded guilty to ... breaching the International Emergency Economic Powers Act. The act allows the US president to limit the ways US citizens carry out commerce abroad by declaring an international emergency. One such limitation, introduced in 2008 and renewed annually, blocks US citizens from exporting technology, goods or services to the US. Griffith violated that ... (view more)
A new variant of Android malware quite literally hides its activities. 'Octo' darkens the screen so that users can't see it stealing data. Researchers at Threat Fabric say the malware takes advantage of a built-in Android feature called ... "STREAM_SCREEN". It's not quite a live feed, but remotely transmits around one screenshot a second. (Source: threatfabric.com ) The scammers then misuse an accessibility feature in Android to remotely control the device. The stream screening lets them see what they are doing, despite not having physical access. Black Screen Disguise The sneakiest ... (view more)
Google has issued a third zero-day bug warning for Chrome this year. While the browser will auto-update, it's a reminder not to leave it open indefinitely. In short, a zero-day bug refers to the time developers discovered the problem and were able ... to roll out a fix. Ideally, they'll have a head start and can either get the patch in place before would-be attackers even start working on exploiting it. In this case, however, attackers not only know about the bug but are already taking advantage before developers can roll out a fix. Memory Compromised This particular bug is described as a "type ... (view more)
Are you being blackmailed online? Are blackmailers threatening to expose you through Facebook, Instagram, or LinkedIn? If so, you've come to the right place. You may Contact me here using the contact form now, or keep reading to learn how I can ... help. IMPORTANT: If you paid the scammers anything at all, they will simply turn around and ask for more . This is how this scam goes 100% of the time. Don't be fooled into thinking a one-time payment will be the end - IT NEVER IS! -- In this article, you will find answers to the following questions: Do blackmailers follow through? Do blackmailers go ... (view more)
Are you being blackmailed online? Are blackmailers threatening to expose you through Facebook, Instagram, or LinkedIn? If so, you've come to the right place. You may Contact me here using the contact form now, or keep reading to learn how I can ... help. IMPORTANT: If you paid the scammers anything at all, they will simply turn around and ask for more . This is how this scam goes 100% of the time. Don't be fooled into thinking a one-time payment will be the end - IT NEVER IS! -- In this article, you'll find the answers to the following questions: What is sextortion ? How long does sextortion last ... (view more)
Need Help? Ask!

My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 20 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).

My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 20 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
Most popular articles
- Being Blackmailed for Money on Facebook? Here's What to Do
- Sextortion - What to Do (and What Not to Do)
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by PC / Web Network Experts? Here's What to Do
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?