In a rare public protest at Facebook, hundreds of staff staged a virtual walkout, pushing back on Zuckerberg's choice to let Trump's inflammatory posts stand
Since macOS 10.12 there's … Theodore Schleifer / Vox : Change will be harder for Silicon Valley than just donating money Wall Street Journal : Social Media Becomes Battleground Ove...
In leaked audio from an internal meeting, Mark Zuckerberg says they will re-examine policies around politicians discussing the use of state force on Facebook
The company is treating a moral issue as if it's a legal one — I. The CEO — On Friday afternoon, Facebook …
Google uses aggregated anonymized location data from 131 countries to show which places are complying with social distancing and which aren't
New COVID-19 mobility reports show changes in traffic to stores, parks, transit stations, and more — Google is using location data gathered …
Google uses aggregated anonymized location data from 131 countries to show which places are complying with social distancing and which aren't
New COVID-19 mobility reports show changes in traffic to stores, parks, transit stations, and more — Google is using location data gathered …
Sources: Google agrees to a worker council in Europe that could have more power to challenge company decisions after a request from 153 employees in 11 offices
Ryan Gallagher / Bloomberg : Tweets: @teamcoworker , @brishenrogers , @tedonprivacy , @tri_becca90 , @stan_ds , @rj_gallagher , and @histoftech Tweets: @teamcoworker : “Google emp...
Google has hired IRI Consultants, an anti-union consulting company, signaling the feud between some activist employees and management has escalated
After nearly two years of unrest, the company appears to be cracking down on employee activism. — Google has hired an anti-union consulting firm …
Google is open sourcing its differential privacy library, which it uses to securely draw insights from data sets containing sensitive user information
like cryptography it's subtle and quick to anger. Google has released as open-source code which was built for *mumblemumble handy privacy infrastructure thing*. It has some nice ad...
Google is open sourcing its differential privacy library, which it uses to securely draw insights from data sets containing sensitive user information
like cryptography it's subtle and quick to anger. Google has released as open-source code which was built for *mumblemumble handy privacy infrastructure thing*. It has some nice ad...
Google is open sourcing its differential privacy library, which it uses to securely draw insights from data sets containing sensitive user information
Google is making differential privacy available to anyone — Google today announced that it is open-sourcing its so-called differential privacy library …
Google is open sourcing its differential privacy library, which it uses to securely draw insights from data sets containing sensitive user information
Google is making differential privacy available to anyone — Google today announced that it is open-sourcing its so-called differential privacy library …
DOJ charges Pakistani man with bribing AT&T employees over $1M to install malware on the company's network, in a scheme that unlocked more than 2M devices
Allegedly bribed workers at AT&T's Bothell, WA Customer Service Center to plant malware and illegally unlock cell phones https://www.justice.gov/... Bobby Chesney / @bobbychesney :...
DOJ charges Pakistani man with bribing AT&T employees over $1M to install malware on the company's network, in a scheme that unlocked more than 2M devices
DOJ charges Pakistani man with bribing AT&T employees more than $1 million to install malware on the company's network, unlock more than 2 million devices.
How third-party scripts on websites exploit a flaw in browsers' built-in password managers to identify and track users
In this second installment of the No Boundaries series, we show how a long-known vulnerability in browsers' built-in password managers is abused by third-party scripts for tracking...
How third-party scripts on websites exploit a flaw in browsers' built-in password managers to identify and track users
In this second installment of the No Boundaries series, we show how a long-known vulnerability in browsers' built-in password managers is abused by third-party scripts for tracking...