Feedback

Simfin

online safety and digital citizenship specialist

Adults who work with Young People News

05 February 2020

'I’m writing this to illustrate that the best phishing attacks will look very convincing. Often people are told to watch out for poor grammar and formatting to protect against phishing. This will work in some cases, but not in cases like the one I’m about to show. Sophisticated scammers use good English and pattern-match with legitimacy.'

Read more

31 January 2020

When should we silence those who we disagree with?

Controversial commentator Katie Hopkins has had her Twitter account suspended for violating its anti-hate policy.

Twitter typically doesn't comment when an account is suspended.

Late last year Twitter broke its silence on why it has not blocked US President Donald Trump, who in the eyes of many has tweeted or reposted hateful comments. Twitter said it made exceptions for world leaders.

Read more

26 January 2020

Airbnb has developed technology that looks at guests’ online “personalities” when they book a break to calculate the risk of them trashing a host’s home.

Details have emerged of its “trait analyser” software built to scour the web to assess users’ “trustworthiness and compatibility” as well as their “behavioural and personality traits” in a bid to forecast suitability to rent a property.

Read more

23 January 2020

'I’ve realized how blind we are to the kinds of insights tech companies are gaining about us through our gadgets. Our blindness not only keeps us glued to privacy-invading tech — it also means that we’ve failed to create a political culture that is in any way up to the task of limiting surveillance.'

Read more

12 January 2020

This article is important for all of us. It shows how UK media create fake news to nurture racism and extremism.

If you want to understand the Sussexes’ decision to step back from front-line royal duties, then the answers are contained in one remarkable legal document.

Read more

07 January 2020

Individuals will have to become their own chief security officer – finding a way to manage and control access to all of their digital assets, cloud services, social media profiles, personal communications and private devices. As our personal digital universes expand exponentially, so will the necessity of controlling our data and digital identities.

Read more