Google is a powerful search tool, allowing users to collate data from all over the internet. Google Image Search is a big part of the search engine’s […]
Google is a powerful search tool, allowing users to collate data from all over the internet. Google Image Search is a big part of the search engine’s […]
Billions of new images and profiles appear on Facebook every day. If a harasser is impersonating you, or someone uploads media of you without your permission, it […]
Revenge pornography, also known as non-consensual pornography, is a growing problem in the digital age. It refers to the unauthorized sharing of sexually explicit or intimate images […]
In late July 2020, we were contacted by a woman we will call “X” for privacy reasons. Her ex-husband had posted five different private sex videos of […]
When you take a picture or create an image on your phone or computer, personal information is saved in the image as metadata. Information such as your […]
It can be very difficult discovering that your personal information is available via Google. If someone decides to put your information on their website, Google will probably […]
As I run a news site on CCN.com, we see our content frequently copied across the web. This is a big issue for us as these sites […]
TikTok is a short-form video and music platform that has seen rapid growth. This has led to a certain amount of vulnerability, mainly thanks to the app’s […]
YouTube has provided a video platform to millions of users. Since anyone can upload almost anything, that leaves users open to abuse and the sharing of personal […]
Twitter allows people from all walks of life to connect and discuss new ideas and philosophies. That openness does leave users vulnerable to abuse online, especially surrounding […]
Facebook has connected millions of people around the world. But that connection comes with a price. Using the service sacrifices your privacy, and leaves you vulnerable to […]
Instagram allows people to post pictures and share them with friends, fans, and family. That connectivity comes with risks. Private and personal images can be misused and […]