TikTok has admitted censoring posts by users it identified as disabled, fat or LGBTQ+ as part of a misguided effort to cut down on bullying on the platform.
Tagged with article
Adam Parker's boyfriend Dean Eastmond died from cancer at the age of 21 in September 2017. They'd been dating for two years.
The couple first spoke on Twitter when Adam sent a message to Dean to tell him how cute a photo of his cat was.
And since Dean's death, Adam has used his boyfriend's tweets to remember him.
"Grief is complex, strange and it works in different ways," the 25-year-old tells Radio 1 Newsbeat.
'She was the only one to be prosecuted of the 17 people who received the child abuse video.'
There is a lot to think about here. Those of us who work with young people are held to account perhaps more severely than 'other' adults.
A senior police officer convicted of possessing a child abuse video on her phone has been told she faces "immense" career consequences.
A court heard Novlett Robyn Williams failed to report her sister for sending the "disturbing" clip last year.
While jurors at the Old Bailey accepted Williams did not view the material, they rejected her claim she was unaware of its presence on her phone.
Identity theft is at an all-time high in the UK. The UK's fraud prevention service CIFAS recorded 190,000 cases in the past year, as our increasingly digitised lives make it easier than ever for fraudsters to get their hands on our personal information.
Stalkerware - also known as spouseware - are powerful surveillance software programs typically sold openly online.
On a device, all messages can be read, screen activity recorded, GPS locations tracked and cameras used to spy on what an individual is doing.
Most Americans don’t know that social media giant Facebook owns Instagram and WhatsApp.
They also don’t know that private browsing modes hide online activities only from someone else using the same computer. And few can correctly identify an example of true two-factor authentication, a security measure experts say is one of the most important ways users can protect sensitive information.