#exploitation

[ follow ]
www.theguardian.com
2 weeks ago
Marketing

Dancing for the Devil: The 7M TikTok Cult review a horribly mesmerising look at an invite-only church

The documentary sheds light on the 7M TikTok cult, revealing the true impact of social media fame and the blurred lines between ambition and exploitation. [ more ]
#sex-trafficking
Brooklyn Paper
3 weeks ago
Brooklyn

East New York man accused of raping teen and attempted sex trafficking: DA * Brooklyn Paper

Exploitation of a vulnerable teenager for prostitution is a serious crime that needs to be reported and prosecuted to prevent further harm. [ more ]
Brooklyn Paper
3 months ago
Brooklyn

East New York couple indicted for sex trafficking 15-year-old girl: DA * Brooklyn Paper

Indictment of a couple in Brooklyn for sex trafficking a 15-year-old girl.
Couple's alleged manipulation tactics and exploitation of the victim. [ more ]
Brooklyn Paper
3 weeks ago
Brooklyn

East New York man accused of raping teen and attempted sex trafficking: DA * Brooklyn Paper

Exploitation of a vulnerable teenager for prostitution is a serious crime that needs to be reported and prosecuted to prevent further harm. [ more ]
Brooklyn Paper
3 months ago
Brooklyn

East New York couple indicted for sex trafficking 15-year-old girl: DA * Brooklyn Paper

Indictment of a couple in Brooklyn for sex trafficking a 15-year-old girl.
Couple's alleged manipulation tactics and exploitation of the victim. [ more ]
moresex-trafficking
www.nytimes.com
3 weeks ago
US news

Where Did Justine Go?' One Woman Disappears Into Devotion

Recognizing and addressing emotional and spiritual abuse in religious communities. [ more ]
Vulture
3 months ago
Writing

The Empty Impact of Dune: Part Two's Villain Turn

Arrakis, the desert planet in "Dune," has been exploited for its resources by outsider colonizers, leading to generations of suffering for the native Fremen people.
The character Paul Atreides grapples with his destiny as the messianic figure Lisan al Gaib while balancing personal ambitions against the welfare of Arrakis and its inhabitants. [ more ]
www.mercurynews.com
1 month ago
Writing

Review: Winehouse deserves better than mediocre Back to Black'

A conventional biopic on Amy Winehouse fails to live up to the intimate and unfiltered portrayal seen in the documentary Amy by Asif Kapadia. [ more ]
Irish Independent
1 month ago
Women

Ireland's rental market creates 'perfect environment' for the exploitation of tenants, including 'sex for rent' - research

Women in tax relief room rentals vulnerable to sex for rent exploitation. [ more ]
Above the Law
1 month ago
Remote teams

When Is It Appropriate To Work For Free?

Working for free can be a double-edged sword, providing opportunities for experience and connections but also potentially leading to exploitation and unfavorable perceptions. [ more ]
#cybersecurity
Theregister
1 month ago
Information security

NHS Digital hints at exploit sightings of Arcserve UDP vulns

NHS warns of actively exploited vulnerabilities in Arcserve UDP software. [ more ]
Theregister
1 month ago
Information security

Federal frenzy to patch gaping security hole in GitLab

CISA mandates federal agencies to patch critical GitLab vulnerability under active exploitation. [ more ]
Graham Cluley
1 year ago
Information security

BBC staffers warned of payroll data breach. Other firms also affected by MOVEit vulnerability

1. Organizations are vulnerable to data breaches due to unpatched vulnerabilities, such as the MoveIt vulnerability.
2. Organizations should take proactive measures to patch known security vulnerabilities to prevent data breaches.
3. Organizations should also ensure their staff are aware of the risks of data breaches and how to respond if one occurs. [ more ]
SecurityWeek
1 year ago
Information security

CISA: Several Old Linux Vulnerabilities Exploited in Attacks

The US Cybersecurity and Infrastructure Security Agency (CISA) has added several Linux and Linux-related flaws to its known exploited vulnerabilities (KEV) catalog.The agency added seven new vulnerabilities to its KEV catalog on Friday: Ruckus AP remote code execution (CVE-2023-25717), Red Hat Polkit privilege escalation (CVE-2021-3560), Linux kernel privilege escalations (CVE-2014-0196 and CVE-2010-3904), Jenkins UI information disclosure (CVE-2015-5317), Apache Tomcat remote code execution (CVE-2016-8735), and an Oracle Java SE and JRockit issue (CVE-2016-3427).
SecurityWeek
1 year ago
Privacy professionals

Critical Siemens RTU Vulnerability Could Allow Hackers to Destabilize Power Grid

A critical vulnerability affecting some of Siemens' industrial control systems (ICS) designed for the energy sector could allow malicious hackers to destabilize a power grid, according to the researchers who found the security hole.The vulnerability, tracked as CVE-2023-28489, impacts the CPCI85 firmware of Sicam A8000 CP-8031 and CP-8050 products, and it can be exploited by an unauthenticated attacker for remote code execution.
SecurityWeek
1 year ago
Information security

Android Security Update Patches Kernel Vulnerability Exploited by Spyware Vendor

Google's Android security updates for May 2023 patch more than 40 vulnerabilities, including a kernel flaw exploited as a zero-day by a spyware vendor.The latest Android updates patch vulnerabilities in the framework, system, kernel, Arm, Imagination Technologies, MediaTek, Unisoc, and Qualcomm components.
Theregister
1 month ago
Information security

NHS Digital hints at exploit sightings of Arcserve UDP vulns

NHS warns of actively exploited vulnerabilities in Arcserve UDP software. [ more ]
Theregister
1 month ago
Information security

Federal frenzy to patch gaping security hole in GitLab

CISA mandates federal agencies to patch critical GitLab vulnerability under active exploitation. [ more ]
Graham Cluley
1 year ago
Information security

BBC staffers warned of payroll data breach. Other firms also affected by MOVEit vulnerability

1. Organizations are vulnerable to data breaches due to unpatched vulnerabilities, such as the MoveIt vulnerability.
2. Organizations should take proactive measures to patch known security vulnerabilities to prevent data breaches.
3. Organizations should also ensure their staff are aware of the risks of data breaches and how to respond if one occurs. [ more ]
SecurityWeek
1 year ago
Information security

CISA: Several Old Linux Vulnerabilities Exploited in Attacks

The US Cybersecurity and Infrastructure Security Agency (CISA) has added several Linux and Linux-related flaws to its known exploited vulnerabilities (KEV) catalog.The agency added seven new vulnerabilities to its KEV catalog on Friday: Ruckus AP remote code execution (CVE-2023-25717), Red Hat Polkit privilege escalation (CVE-2021-3560), Linux kernel privilege escalations (CVE-2014-0196 and CVE-2010-3904), Jenkins UI information disclosure (CVE-2015-5317), Apache Tomcat remote code execution (CVE-2016-8735), and an Oracle Java SE and JRockit issue (CVE-2016-3427).
SecurityWeek
1 year ago
Privacy professionals

Critical Siemens RTU Vulnerability Could Allow Hackers to Destabilize Power Grid

A critical vulnerability affecting some of Siemens' industrial control systems (ICS) designed for the energy sector could allow malicious hackers to destabilize a power grid, according to the researchers who found the security hole.The vulnerability, tracked as CVE-2023-28489, impacts the CPCI85 firmware of Sicam A8000 CP-8031 and CP-8050 products, and it can be exploited by an unauthenticated attacker for remote code execution.
SecurityWeek
1 year ago
Information security

Android Security Update Patches Kernel Vulnerability Exploited by Spyware Vendor

Google's Android security updates for May 2023 patch more than 40 vulnerabilities, including a kernel flaw exploited as a zero-day by a spyware vendor.The latest Android updates patch vulnerabilities in the framework, system, kernel, Arm, Imagination Technologies, MediaTek, Unisoc, and Qualcomm components.
morecybersecurity
www.newsshopper.co.uk
1 month ago
London

Heartless scammers and conmen to watch out for in south London

Some individuals may exploit vulnerable individuals to feed their addictions, as seen in cases of stealing savings and administering fake vaccines to the elderly. [ more ]
#vulnerability
Ars Technica
1 month ago
Information security

0-click GitLab hijacking flaw under active exploit, with thousands still unpatched

A maximum severity vulnerability in GitLab allows account hijacking without user interaction. [ more ]
TechCrunch
4 months ago
Information security

Researchers say attackers are mass-exploiting new Ivanti VPN flaw | TechCrunch

Hackers are mass exploiting a third vulnerability in Ivanti's VPN appliance, affecting thousands of organizations worldwide.
One of the newly discovered flaws is a server-side request forgery flaw, which is being actively exploited by hacking groups. [ more ]
SecurityWeek
6 months ago
Information security

Exploitation of Critical ownCloud Vulnerability Begins

Threat actors are exploiting a critical information disclosure vulnerability in ownCloud shortly after its public disclosure.
The vulnerability impacts the Graphapi app and allows attackers to retrieve sensitive information.
Administrators are urged to follow mitigation steps outlined by ownCloud. [ more ]
SecurityWeek
6 months ago
Information security

Citrix, Gov Agencies Issue Fresh Warnings on CitrixBleed Vulnerability

CVE-2023-4966 (CitrixBleed) is a critical vulnerability in Citrix's NetScaler product that leads to information disclosure.
The flaw had been exploited as a zero-day since August and mass exploitation began three weeks ago.
LockBit ransomware gang has started exploiting the vulnerability, targeting organizations across multiple critical infrastructure sectors. [ more ]
https://www.gizbot.com/
1 year ago
Apple

Apple Releases iOS 16.5 With Security And Bug Fixes: Won't Be The Last iPhone Update Before iOS 17

Apple released the iOS 16.5 update for its iPhone devices this week.The update is a significant one but it does not contain new and pathbreaking features and functions.The iOS 16.5 update contains two minor new additions to preexisting features.However, there are some important bug fixes, and Apple has addressed multiple security vulnerabilities.
SecurityWeek
1 year ago
Information security

WordPress Field Builder Plugin Vulnerability Exploited in Attacks Two Days After Patch

Threat actors were seen adopting public proof-of-concept (PoC) exploit code targeting a cross-site scripting (XSS) vulnerability in the Advanced Custom Fields WordPress plugin only two days after a patch was released, Akamai reports.Tracked as CVE-2023-30777, the high-severity vulnerability could allow attackers to inject malicious scripts and other payloads into vulnerable websites.
Ars Technica
1 month ago
Information security

0-click GitLab hijacking flaw under active exploit, with thousands still unpatched

A maximum severity vulnerability in GitLab allows account hijacking without user interaction. [ more ]
TechCrunch
4 months ago
Information security

Researchers say attackers are mass-exploiting new Ivanti VPN flaw | TechCrunch

Hackers are mass exploiting a third vulnerability in Ivanti's VPN appliance, affecting thousands of organizations worldwide.
One of the newly discovered flaws is a server-side request forgery flaw, which is being actively exploited by hacking groups. [ more ]
SecurityWeek
6 months ago
Information security

Exploitation of Critical ownCloud Vulnerability Begins

Threat actors are exploiting a critical information disclosure vulnerability in ownCloud shortly after its public disclosure.
The vulnerability impacts the Graphapi app and allows attackers to retrieve sensitive information.
Administrators are urged to follow mitigation steps outlined by ownCloud. [ more ]
SecurityWeek
6 months ago
Information security

Citrix, Gov Agencies Issue Fresh Warnings on CitrixBleed Vulnerability

CVE-2023-4966 (CitrixBleed) is a critical vulnerability in Citrix's NetScaler product that leads to information disclosure.
The flaw had been exploited as a zero-day since August and mass exploitation began three weeks ago.
LockBit ransomware gang has started exploiting the vulnerability, targeting organizations across multiple critical infrastructure sectors. [ more ]
https://www.gizbot.com/
1 year ago
Apple

Apple Releases iOS 16.5 With Security And Bug Fixes: Won't Be The Last iPhone Update Before iOS 17

Apple released the iOS 16.5 update for its iPhone devices this week.The update is a significant one but it does not contain new and pathbreaking features and functions.The iOS 16.5 update contains two minor new additions to preexisting features.However, there are some important bug fixes, and Apple has addressed multiple security vulnerabilities.
SecurityWeek
1 year ago
Information security

WordPress Field Builder Plugin Vulnerability Exploited in Attacks Two Days After Patch

Threat actors were seen adopting public proof-of-concept (PoC) exploit code targeting a cross-site scripting (XSS) vulnerability in the Advanced Custom Fields WordPress plugin only two days after a patch was released, Akamai reports.Tracked as CVE-2023-30777, the high-severity vulnerability could allow attackers to inject malicious scripts and other payloads into vulnerable websites.
morevulnerability
#vulnerabilities
TechRepublic
1 month ago
Information security

OpenAI's GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities

GPT-4 can autonomously exploit one-day vulnerabilities. [ more ]
Ars Technica
4 months ago
Information security

As if two Ivanti vulnerabilities under explot wasn't bad enough, now there are 3

Mass exploitation has begun for a critical vulnerability in Ivanti's VPN software, which comes as two other vulnerabilities are already being exploited.
The new vulnerability, tracked as CVE-2024-21893, is a server-side request forgery that has seen a rapid increase in attacks since its disclosure. [ more ]
ComputerWeekly.com
4 months ago
Privacy professionals

WebKit vulnerability sparks Apple's first major security update of 2024 | Computer Weekly

Apple has released patches for multiple vulnerabilities, including a critical zero-day in the WebKit browser engine used by Safari.
The zero-day vulnerability, CVE-2024-23222, could allow threat actors to execute arbitrary code on Apple devices.
The patch covers various Apple devices, and the extent of exploitation and the actors involved have not been disclosed by Apple. [ more ]
www.cbc.ca
1 year ago
Toronto

Multiple arrests made, 13 victims saved in human trafficking investigation: Peel police | CBC News

Thirteen victims of human trafficking have been rescued from their alleged captors following a yearlong investigation in Mississauga, Peel Regional Police say.Det.David Laing, who led the operation, announced at a news conference Wednesday that five people were arrested, numerous charges laid and law enforcement officers also recovered drugs and other property.
TechRepublic
1 year ago
Information security

Learn how to protect your company from cyberattacks for just $46

1. Establish controls and policies related to cloud usage, such as setting up a zero-trust framework and using multi-factor authentication.
2. Monitor and audit cloud activity to ensure that no unauthorized actions are taking place.
3. Establish a cross-functional team to help maintain cloud
SecurityWeek
1 year ago
Information security

Apple Patches 3 Exploited WebKit Zero-Day Vulnerabilities

Apple on Thursday released security updates for its operating systems to patch dozens of vulnerabilities that could expose iPhones and Macs to hacker attacks, including three zero-days affecting the WebKit browser engine.Two of the actively exploited vulnerabilities, CVE-2023-28204 and CVE-2023-32373, have been reported to the tech giant by an anonymous researcher.
TechRepublic
1 month ago
Information security

OpenAI's GPT-4 Can Autonomously Exploit 87% of One-Day Vulnerabilities

GPT-4 can autonomously exploit one-day vulnerabilities. [ more ]
Ars Technica
4 months ago
Information security

As if two Ivanti vulnerabilities under explot wasn't bad enough, now there are 3

Mass exploitation has begun for a critical vulnerability in Ivanti's VPN software, which comes as two other vulnerabilities are already being exploited.
The new vulnerability, tracked as CVE-2024-21893, is a server-side request forgery that has seen a rapid increase in attacks since its disclosure. [ more ]
ComputerWeekly.com
4 months ago
Privacy professionals

WebKit vulnerability sparks Apple's first major security update of 2024 | Computer Weekly

Apple has released patches for multiple vulnerabilities, including a critical zero-day in the WebKit browser engine used by Safari.
The zero-day vulnerability, CVE-2024-23222, could allow threat actors to execute arbitrary code on Apple devices.
The patch covers various Apple devices, and the extent of exploitation and the actors involved have not been disclosed by Apple. [ more ]
www.cbc.ca
1 year ago
Toronto

Multiple arrests made, 13 victims saved in human trafficking investigation: Peel police | CBC News

Thirteen victims of human trafficking have been rescued from their alleged captors following a yearlong investigation in Mississauga, Peel Regional Police say.Det.David Laing, who led the operation, announced at a news conference Wednesday that five people were arrested, numerous charges laid and law enforcement officers also recovered drugs and other property.
TechRepublic
1 year ago
Information security

Learn how to protect your company from cyberattacks for just $46

1. Establish controls and policies related to cloud usage, such as setting up a zero-trust framework and using multi-factor authentication.
2. Monitor and audit cloud activity to ensure that no unauthorized actions are taking place.
3. Establish a cross-functional team to help maintain cloud
SecurityWeek
1 year ago
Information security

Apple Patches 3 Exploited WebKit Zero-Day Vulnerabilities

Apple on Thursday released security updates for its operating systems to patch dozens of vulnerabilities that could expose iPhones and Macs to hacker attacks, including three zero-days affecting the WebKit browser engine.Two of the actively exploited vulnerabilities, CVE-2023-28204 and CVE-2023-32373, have been reported to the tech giant by an anonymous researcher.
morevulnerabilities
www.theguardian.com
1 month ago
UK news

Sunak pressed to end Rwanda bill impasse by exempting Afghan service veterans

Rishi Sunak faces pressure over Rwanda deportation bill concessions. [ more ]
ReadWrite
2 months ago
Video games

Fortnite players fall into digital debt after V-Bucks glitch gets hammered

Fortnite players exploiting a glitch to get more digital currency now face V-Bucks debt due to Epic Games cracking down. [ more ]
Towleroad Gay News
2 months ago
Film

Brooklyn Beckham's Billionaire Heiress Wife Nicola's Debut Film Slammed As 'poverty Porn' - Towleroad Gay News

Critics slam Nicola Peltz Beckham's film Lola as 'poverty porn' for exploiting the working class. [ more ]
www.independent.co.uk
2 months ago
London

Ukrainians granted sanctuary in Britain sent to live with suspected gangsters

Ukrainian refugees in the Homes for Ukraine program were placed with suspected criminals, raising concerns about safeguarding and exploitation. [ more ]
IPWatchdog.com | Patents & Intellectual Property Law
2 months ago
Marketing

An Independent Musician's Perspective on the TikTok Legislation Before Congress

TikTok legislation aims to restrict ties to Chinese Communist Party and enhance national security.
TikTok is criticized for exploiting musicians and hosting unlicensed, pirated music. [ more ]
www.nytimes.com
2 months ago
Women

Opinion | The Online Degradation of Women and Girls That We Meet With a Shrug

Deepfakes extend beyond political manipulation to exploiting women and girls in pornographic ways.
Deepfake nude imagery disproportionately impacts women and girls with little recourse. [ more ]
Truthout
3 months ago
Social justice

Care Must Be a Collective Practice of Survival, Not a Site of Profit Extraction

Care work in the U.S. economy is exploitative and profit-driven, necessitating alternative approaches.
The term 'care' in capitalism can obscure exploitation and consumer complicity. [ more ]
#low-wages
www.independent.co.uk
3 months ago
UK news

Migrant care workers paid less than 5 a hour, report finds

Migrant care workers in the UK are being paid significantly low wages, with some earning less than 5 per hour.
Short-term visa routes for social care and domestic workers in the UK enable exploitation and modern slavery risks. [ more ]
The Nation
3 months ago
Social justice

It's Time to Compost the Prison Plantation

Prisons use agriculture to cover up mass incarceration reality
Incarcerated workers paid extremely low wages [ more ]
www.independent.co.uk
3 months ago
UK news

Migrant care workers paid less than 5 a hour, report finds

Migrant care workers in the UK are being paid significantly low wages, with some earning less than 5 per hour.
Short-term visa routes for social care and domestic workers in the UK enable exploitation and modern slavery risks. [ more ]
The Nation
3 months ago
Social justice

It's Time to Compost the Prison Plantation

Prisons use agriculture to cover up mass incarceration reality
Incarcerated workers paid extremely low wages [ more ]
morelow-wages
#legislation
www.cosmopolitan.com
3 months ago
Parenting

"Sharenting": The Real Cost of Being a Parent Influencer's Kid

Child influencers are often not legally entitled to a share of earnings
Family content creators profit from featuring children but may leave them unprotected [ more ]
ComputerWeekly.com
1 year ago
Privacy professionals

Why we need a secure side door for encrypted apps, not a back door | Computer Weekly

There has been a significant uptick in interest in e2e encryption as the UK Government tries to establish "back doors" for messaging apps through the controversial Online Safety Bill.Now at the committee stage in the House of Lords, it remains to be seen what the outcome will be.What is certain is that the legislation has stoked the fire that is the privacy versus protection debate.
www.cosmopolitan.com
3 months ago
Parenting

"Sharenting": The Real Cost of Being a Parent Influencer's Kid

Child influencers are often not legally entitled to a share of earnings
Family content creators profit from featuring children but may leave them unprotected [ more ]
ComputerWeekly.com
1 year ago
Privacy professionals

Why we need a secure side door for encrypted apps, not a back door | Computer Weekly

There has been a significant uptick in interest in e2e encryption as the UK Government tries to establish "back doors" for messaging apps through the controversial Online Safety Bill.Now at the committee stage in the House of Lords, it remains to be seen what the outcome will be.What is certain is that the legislation has stoked the fire that is the privacy versus protection debate.
morelegislation
www.theguardian.com
3 months ago
UK politics

Anti-migrant, pro-Boris, anti-care worker: the Tories are pushing panic buttons that no longer work | Owen Jones

Government banning overseas care workers' dependants from the UK
The Conservative government's strategies criticized for neglecting care worker exploitation [ more ]
www.nytimes.com
3 months ago
Artificial intelligence

A Celebrity Dies, and New Biographies Pop Up Overnight. The Author? A.I.

Hasty, shoddy, A.I.-generated biographies of recently deceased individuals are being published for profit.
Authors are capitalizing on people's grief by creating inaccurate biographies using A.I. text generation. [ more ]
www.nytimes.com
4 months ago
Parenting

U.S. Failed to Safeguard Many Migrant Children, Review Finds

Department of Health and Human Services failed to thoroughly vet adult sponsors for migrant children
Children placed in dangerous working conditions [ more ]
#migrant-workers
www.aljazeera.com
4 months ago
Canada news

Overtly racist': Lawsuit challenges Canada's migrant farmworker system

Canada's migrant worker programs are facing criticism for violating workers' rights and perpetuating racism and discrimination.
Tied employment, where migrant workers are bound to a specific employer, undermines their ability to organize and demand better wages and conditions. [ more ]
www.independent.co.uk
1 year ago
Berlin

Qatar minister elected to head UN labor conference following World Cup scrutiny

The labor minister of Qatar, which faced intense scrutiny over its treatment of migrant workers in the run-up to last year's World Cup soccer tournament, was elected Monday as the president of the United Nations labor agency's annual conference.Asian and Pacific nations proposed Ali bin Samikh al-Marri to lead the International Labor Agency's two-week conference in Geneva.
www.aljazeera.com
4 months ago
Canada news

Overtly racist': Lawsuit challenges Canada's migrant farmworker system

Canada's migrant worker programs are facing criticism for violating workers' rights and perpetuating racism and discrimination.
Tied employment, where migrant workers are bound to a specific employer, undermines their ability to organize and demand better wages and conditions. [ more ]
www.independent.co.uk
1 year ago
Berlin

Qatar minister elected to head UN labor conference following World Cup scrutiny

The labor minister of Qatar, which faced intense scrutiny over its treatment of migrant workers in the run-up to last year's World Cup soccer tournament, was elected Monday as the president of the United Nations labor agency's annual conference.Asian and Pacific nations proposed Ali bin Samikh al-Marri to lead the International Labor Agency's two-week conference in Geneva.
moremigrant-workers
Ars Technica
4 months ago
Artificial intelligence

4chan daily challenge sparked deluge of explicit AI Taylor Swift images

4chan users exploited AI image generators to create and spread fake explicit images of Taylor Swift.
The 4chan community actively shares tips to bypass AI image generator filters and continues to engage in this behavior. [ more ]
Ars Technica
4 months ago
Information security

Agencies using vulnerable Ivanti products have until Saturday to disconnect them

Federal civilian agencies must disconnect from Ivanti VPN software due to critical vulnerabilities.
Ivanti disclosed three critical vulnerabilities in recent weeks that are actively being exploited by threat groups. [ more ]
GameSpot
4 months ago
Video games

Palworld Is Refreshingly Comfortable With Being Immoral

Palworld is a creature collector game that embraces and acknowledges its exploitation and violence gameplay systems.
The game presents a dark and cynical perspective on the genre, contrasting with the typical joyful and heartfelt portrayal of similar games. [ more ]
The Atlantic
4 months ago
Digital life

Is Pornography Immoral?

Americans are divided about the morality of pornography.
Participating in pornography can contribute to the exploitation of women and children. [ more ]
KQED
5 months ago
Books

'Chain-Gang All-Stars' Author Talks Abolition, Sci-Fi in Oakland | KQED

In Nana Kwame Adjei-Brenyah's debut novel, incarcerated people fight in televised gladiator matches for a chance at freedom.
Chain-Gang All-Stars is a searing indictment of the American prison system and the public's complicity in injustice.
The story features two Black women in love who strive for connection despite their dehumanizing circumstances. [ more ]
#immigration
www.independent.co.uk
5 months ago
UK news

Rwanda plan puts modern slavery victims at further risk of exploitation - campaigners

Hostile immigration policies in the UK are putting asylum seekers at risk of exploitation by criminal gangs in the underground economy.
New data shows a spike in cases of modern slavery, with 591 cases recorded between January and March 2023, compared to 556 in the same period in 2022. [ more ]
www.theguardian.com
6 months ago
Europe politics

The west's dumping of migrants on poor countries is a grisly echo of penal transportation | Kenan Malik

Britain exploits poorer nations to dump unwanted migrants
Rich countries devalue sovereignty of weaker nations [ more ]
www.independent.co.uk
5 months ago
UK news

Rwanda plan puts modern slavery victims at further risk of exploitation - campaigners

Hostile immigration policies in the UK are putting asylum seekers at risk of exploitation by criminal gangs in the underground economy.
New data shows a spike in cases of modern slavery, with 591 cases recorded between January and March 2023, compared to 556 in the same period in 2022. [ more ]
www.theguardian.com
6 months ago
Europe politics

The west's dumping of migrants on poor countries is a grisly echo of penal transportation | Kenan Malik

Britain exploits poorer nations to dump unwanted migrants
Rich countries devalue sovereignty of weaker nations [ more ]
moreimmigration
Slate Magazine
6 months ago
Books

I Read the New Memoir Everyone Is Arguing About. It's Astonishing.

A memoir titled 'Molly' has garnered attention and mixed reviews from various media outlets.
The memoir's author, Blake Butler, defends himself against allegations of exploitation. [ more ]
www.theguardian.com
7 months ago
Soccer (FIFA)

Workers' rights were touted to be part of the Qatar World Cup's legacy. One year on, what has changed?

Migrant workers in Qatar say that life has not improved after the World Cup.
Amnesty International claims progress on implementing new labor laws in Qatar has stalled. [ more ]
The Sacramento Bee
11 months ago
California

FBI warns California parents of child predators using 'group grooming' tactic online

The FBI is warning people of predators targeting children online using a tactic called "group grooming." San Francisco's FBI field office issued an announcement Thursday, after it reported trends in sexual predators working together to expose children to explicit content and exploit them.
#people
Streetsblog
1 year ago
San Francisco

Temp Tags Begone! After Streetsblog Investigation, Texas Eliminates Paper License Plates - Streetsblog USA

One down, dozens more to go.Texas will eliminate temporary license plates - the paper versions of real plates that nefarious dealers and outright crooks around the country are selling to drivers to avoid speed cameras, commit other vehicular crimes or simply to keep driving if they lack insurance or a driver's license.
Non Profit News | Nonprofit Quarterly
1 year ago
Non-profit sector

One Year after Devastating Floods Hit Eastern Kentucky, Appalshop Continues to Rise - Non Profit News | Nonprofit Quarterly

When the water came, Alex Gibson was prepared for, as he put it, "regular flooding."But regular flooding was not what surged through multiple counties in Eastern Kentucky in late July of 2022, killing over 40 people and displacing thousands from their homes.For five days, heavy rain struck an area already vulnerable from decades of exploitation.
www.independent.co.uk
1 year ago
UK news

Most carers not paid for travel time between appointments study

Three out of four care staff who look after people at home are not being paid for the time it takes them to travel between appointments, according to new research.Unison said its survey of more than 300 care workers across England revealed that employers are effectively breaking minimum wage laws, costing staff hundreds of pounds each month.
www.theguardian.com
1 year ago
Mental health

People who use smart drugs' worse at complex tasks, study finds

Smart drugs are not helpful for complex tasks: A recent study has found that people who take 'smart drugs' are worse at performing complex tasks than those who don't.
Smart drugs can lead to negative side effects: The study found that those who took smart drugs experienced a greater amount of side effects than those who didn't, such as headaches, nausea, and anxiety. [ more ]
www.standard.co.uk
1 year ago
London

Report reveals shocking' exploitation of migrant workers in London

A new report has revealed the shocking levels of exploitation and abuse suffered by migrant workers in the capital.Mayor Sadiq Khan, who commissioned the research, said its findings were consistent with modern slavery.The report found that migrant Londoners often work unpaid overtime, or are sometimes left waiting for months to receive wages for work they've done.
www.independent.co.uk
1 year ago
UK news

Illegal Migration Bill breaches UK human rights obligations, MPs and peers warn

The Illegal Migration Bill breaches a number of the UK's human rights obligations, MPs and peers have warned ministers.Most asylum seekers arriving in the UK after the flagship legislation has been passed would have their claim declared inadmissible, according to a report published by Parliament's Joint Committee on Human Rights.
Streetsblog
1 year ago
San Francisco

Temp Tags Begone! After Streetsblog Investigation, Texas Eliminates Paper License Plates - Streetsblog USA

One down, dozens more to go.Texas will eliminate temporary license plates - the paper versions of real plates that nefarious dealers and outright crooks around the country are selling to drivers to avoid speed cameras, commit other vehicular crimes or simply to keep driving if they lack insurance or a driver's license.
Non Profit News | Nonprofit Quarterly
1 year ago
Non-profit sector

One Year after Devastating Floods Hit Eastern Kentucky, Appalshop Continues to Rise - Non Profit News | Nonprofit Quarterly

When the water came, Alex Gibson was prepared for, as he put it, "regular flooding."But regular flooding was not what surged through multiple counties in Eastern Kentucky in late July of 2022, killing over 40 people and displacing thousands from their homes.For five days, heavy rain struck an area already vulnerable from decades of exploitation.
www.independent.co.uk
1 year ago
UK news

Most carers not paid for travel time between appointments study

Three out of four care staff who look after people at home are not being paid for the time it takes them to travel between appointments, according to new research.Unison said its survey of more than 300 care workers across England revealed that employers are effectively breaking minimum wage laws, costing staff hundreds of pounds each month.
www.theguardian.com
1 year ago
Mental health

People who use smart drugs' worse at complex tasks, study finds

Smart drugs are not helpful for complex tasks: A recent study has found that people who take 'smart drugs' are worse at performing complex tasks than those who don't.
Smart drugs can lead to negative side effects: The study found that those who took smart drugs experienced a greater amount of side effects than those who didn't, such as headaches, nausea, and anxiety. [ more ]
www.standard.co.uk
1 year ago
London

Report reveals shocking' exploitation of migrant workers in London

A new report has revealed the shocking levels of exploitation and abuse suffered by migrant workers in the capital.Mayor Sadiq Khan, who commissioned the research, said its findings were consistent with modern slavery.The report found that migrant Londoners often work unpaid overtime, or are sometimes left waiting for months to receive wages for work they've done.
www.independent.co.uk
1 year ago
UK news

Illegal Migration Bill breaches UK human rights obligations, MPs and peers warn

The Illegal Migration Bill breaches a number of the UK's human rights obligations, MPs and peers have warned ministers.Most asylum seekers arriving in the UK after the flagship legislation has been passed would have their claim declared inadmissible, according to a report published by Parliament's Joint Committee on Human Rights.
morepeople
www.standard.co.uk
1 year ago
London

Sadiq Khan announces funding to provide mentors to 100,000 young Londoners

S adiq Khan has announced funding to enable an unprecedented 100,000 young Londoners will have a mentor by the end of 2024, as part of a drive to reduce youth violence in the city.The Mayor says that a 10 million funding boost will allow a further 50,000 young people in the capital access to mentoring support.
www.theguardian.com
1 year ago
UK politics

The pandemic ruined my A-levels now the marking boycott is leaving me without a degree | Kimi Chaddah

This year's graduations, universities claim, will be indistinguishable from those of previous years.Except there's one glaring problem: as a student there isn't much to celebrate.Currently, a marking and assessment boycott is affecting 145 British universities and, like many of the thousands of students graduating this summer, I am set to leave without a formal classification.
TechRepublic
1 year ago
Business intelligence

New zero-click threat targets iPhones and iPads

The Moscow-based cybersecurity company Kaspersky says iOS devices are being targeted by a previously unknown malware.The firm discovered the threat while monitoring the network traffic of its own corporate Wi-Fi.Kaspersky is calling the new campaign Operation Triangulation.The campaign report reveals how the attack works and details the exploitation's technical properties.
TechRepublic
1 year ago
Information security

Zero-day MOVEit Transfer vulnerability exploited in the wild, heavily targeting North America

1. A zero-day vulnerability, called "MoveIt," has been discovered in the popular file transfer protocol SFTP, which could allow attackers to compromise servers.
2. Organizations are advised to update to the latest version of SFTP as soon as possible to protect against this vulnerability.
3. All organizations should have a risk management plan in place to quickly identify and mitigate zero-day vulnerabilities like MoveIt. [ more ]
www.nytimes.com
1 year ago
Artificial intelligence

Opinion | The Twists in the Long Debt Drama

What Succession' Tells Us About America A.I., in Perspective Image Credit...Doug Mills/The New York Times To the Editor: Re Agreement Is Reached to Increase Debt Limit, With Cuts in Spending (front page, May 28): The Republicans have done it again.They're putting the onus on the needy, the poor, but giving the wealthy a free ride.
www.npr.org
1 year ago
Arts

3 new books in translation blend liberation with darkness

Meghan Collins Sullivan/NPR Many novels end in liberation of one sort or another.It is a reliable way to offer catharsis, to give readers the feeling of escape while writing a book that is not escapist as such.Blending liberation with darkness is, then, nothing new but three new novels in translation take the mix as far as it can go.
Zero Day Initiative
1 year ago
Information security

Zero Day Initiative - Exploiting the Sonos One Speaker Three Different Ways: A Pwn2Own Toronto Highlight

1. The ZDI identified three different attack methods for exploiting the Sonos One speaker, including a cross-site scripting vulnerability, an authentication bypass vulnerability, and a command injection vulnerability.
2. The vulnerabilities were exploited during the Pwn2Own Toronto hacking competition, showcasing the serious security risks posed by
www.independent.co.uk
1 year ago
UK news

Meta turning a blind eye to child abuse with encryption plans minister

Meta is choosing to allow predators to operate with impunity by rolling out encrypted messaging despite an epidemic of child abuse, security minister Tom Tugendhat has said.He urged the social media giant which owns Facebook, Instagram and WhatsApp to introduce robust safety measures before extending end-to-end encryption to Facebook Messenger and Instagram Direct later this year to avoid a significant risk to child safety.
#years
Los Angeles Times
1 year ago
Los Angeles

When is fortunetelling worth the money?

Episode 7: "A Prism."In the beginning, Faith thought Paulina was giving her a hot news tip about psychics and scams.Years of investigation revealed something else.Read the episode transcript.See all episodes and extras.By the time I made it back to Mexico in December 2010, I had already missed a lot of my tía Martha's last few months of life.
www.independent.co.uk
1 year ago
Berlin

Germany rejects criticism it watered down language on gas at G7 summit

The German government on Monday rejected criticism that it pushed to weaken existing commitments for phasing out natural gas at a summit of leaders from the Group of Seven major industrialized democracies, saying the concluding statement is in line with international climate efforts.Environmental campaigners slammed the leaders' decision in Japan to back the construction of new infrastructure for liquefied natural gas, a planet-warming fossil fuel.
www.nytimes.com
1 year ago
Right-wing politics

Opinion | Legalizing Marijuana Is a Big Mistake

Of all the ways to win a culture war, the smoothest is to just make the other side seem hopelessly uncool.So it's been with the march of marijuana legalization: There have been moral arguments about the excesses of the drug war and medical arguments about the potential benefits of pot, but the vibe of the whole debate has pitted the chill against the uptight, the cool against the square, the relaxed future against the Principal Skinners of the past.
Los Angeles Times
1 year ago
Los Angeles

When is fortunetelling worth the money?

Episode 7: "A Prism."In the beginning, Faith thought Paulina was giving her a hot news tip about psychics and scams.Years of investigation revealed something else.Read the episode transcript.See all episodes and extras.By the time I made it back to Mexico in December 2010, I had already missed a lot of my tía Martha's last few months of life.
www.independent.co.uk
1 year ago
Berlin

Germany rejects criticism it watered down language on gas at G7 summit

The German government on Monday rejected criticism that it pushed to weaken existing commitments for phasing out natural gas at a summit of leaders from the Group of Seven major industrialized democracies, saying the concluding statement is in line with international climate efforts.Environmental campaigners slammed the leaders' decision in Japan to back the construction of new infrastructure for liquefied natural gas, a planet-warming fossil fuel.
www.nytimes.com
1 year ago
Right-wing politics

Opinion | Legalizing Marijuana Is a Big Mistake

Of all the ways to win a culture war, the smoothest is to just make the other side seem hopelessly uncool.So it's been with the march of marijuana legalization: There have been moral arguments about the excesses of the drug war and medical arguments about the potential benefits of pot, but the vibe of the whole debate has pitted the chill against the uptight, the cool against the square, the relaxed future against the Principal Skinners of the past.
moreyears
www.independent.co.uk
1 year ago
France news

Scorsese debuts 'Killers of the Flower Moon' in Cannes to thunderous applause

Martin Scorsese unveiled Killers of the Flower Moon at Cannes on Saturday, debuting a sweeping American epic about greed and exploitation on the bloody plains of an Osage Nation reservation in 1920s Oklahoma.Scorsese's latest starring Leonardo DiCaprio, Lily Gladstone and Robert De Niro is one of his most ambitious.
www.npr.org
1 year ago
Books

'Yellowface' takes white privilege to a sinister level

Every once in a while there is a novel that enters the literary zeitgeist and requires discourse but it feels like there is nothing that can be written or said that will ever do it justice.This is the feeling R.F.Kuang's new novel Yellowface evokes.The highly immersive satirical novel takes us on a thrilling journey through the eyes of a writer who struggles to make her own way in the cut-throat world of publishing.
www.nytimes.com
1 year ago
World politics

Mysterious Killing of Chinese Gold Miners Puts New Pressure on Beijing

The Chinese embassy in the Central African Republic had a stark warning for its compatriots in the landlocked nation: Do not leave the capital city of Bangui.Kidnappings of foreigners were on the rise, and any Chinese person outside of Bangui was to leave those areas immediately.Less than a week later, on March 19, a group of gunmen stormed a remote gold mine far away from Bangui and killed nine Chinese workers.
news.bitcoin.com
1 year ago
Cryptocurrency

Paypal's Latest Report: $1 Billion in Crypto Assets, Holdings Are Predominantly BTC and ETH Bitcoin News

Payments behemoth Paypal has disclosed in a Form 10-Q financial report filed with the U.S. Securities and Exchange Commission (SEC) that it is holding nearly $1 billion in cryptocurrency assets.This news comes on the heels of Paypal's announcement that Venmo now facilitates external transfers of cryptocurrencies to wallets and exchange platforms.
[ Load more ]