According to a report from CNET, a Facebook employee named Qin Chen jumped off from the fourth floor of the company’s headquarters in Menlo Park, California to end his life. The 38-year-old man, who was a resident of San Mateo, is currently thought to have committed suicide with no foul play involved.
When the district police and the Menlo Park Fire Protection arrived at the scene he was unresponsive, so they tried to revive him but failed. Thus, he was announced dead at the scene.
The police said that the investigation was done ethically. A spokesperson from Facebook said in a statement that, “We’re cooperating with police in their investigation and providing support to employees,” and “While the family is being notified, we have no information to share.”
However, a YouTuber known as Shyu felt there was something fishy about the case, especially since he used to work as a Facebook employee himself. He then uploaded a video to shed light on Facebook’s company culture and to perhaps help give Chen’s family and friends some closure on what might have motivated him to take his life.
He had also collected some intel from Facebook Blind, which is an internal anonymous chat app, and found out that many of the other Facebook employees suspected that Facebook was trying to cover up the suicide as just another “death at workplace”.
Shyu posted the video on Monday and explained details of Chen’s suicide that he had collected from the Blind app. However, Shyu still stresses that these are just speculations and have not been verified.
According to Shyu, based on the posts in the Blind app:
Chen used to work for Facebook’s advertising group, which can also be described as “a very high-stress group.”
Chen’s performance rating dropped, and the company moved him to the PIP or Performance Improvement Plan – or according to the YouTuber, “the path to you getting fired”. For an employee, being put under this program will cause great embarrassment.
Chen tried to make things better by requesting to be transferred to a different team before he was put in PIP.
He allegedly found another team but the manager held back his transfer by convincing him to stay on his team till the end of the quarter and promised to give him a good performance rating.
After the quarter ended, he received a bad rating by his manager that stopped him from moving to a different team.
Chen had enough when they assigned him to do a Severe Site Event (SEV) review. He reportedly tried to delay the process but was blocked by an internal script.
One hour before the review, he allegedly committed suicide.
All of these assumptions were collected by Shyu from the Blind app but the video, and he also showed a poll where 61.8% of the employees admitted that they feel stressed out.
The social-media platform Twitter has suspended hundreds of accounts
alleged to be part of a Chinese government-backed campaign to sow
political discord in Hong Kong, and will no longer accept advertising
from state-controlled media outlets, the company announced on Monday.
Additionally, Facebook removed seven pages, three groups and five accounts involved in what the company called “coordinated inauthentic behaviour as part of a small network that originated in China and focused on Hong Kong”.
In all, Twitter said that 936 accounts originating from within China
have been suspended for a number of violations of the company’s
“platform manipulation policies,” including spam, coordinated activity,
fake accounts and ban evasion.
The social media activity of the suspended accounts,
which posted in both English and Chinese, were part of efforts to
undermine the “legitimacy and political positions of the protest
movement on the ground”, the company said.
Twitter, Facebook and most other western social media platforms are
blocked in mainland China. Most of the accounts identified by Twitter as
“bad faith actors” circumvented the Great Firewall – as the country’s
digital barrier is known – using virtual private networks (VPNs), though
some were tracked to specific, unblocked IP addresses based in mainland
Though most of the accounts had fewer than 100 followers, 326 accounts had more than 10,000 followers and a handful had counts close to 300,000
“Covert, manipulative behaviours have no place on our service,”
Twitter said. “They violate the fundamental principles on which our
company is built.”
The company said “intensive investigations” had found “reliable
evidence to support that this is a coordinated state-backed operation.”
When asked to clarify how its probe had ascertained a connection to
the Chinese government, a spokeswoman for Twitter referred to the
investigation’s findings that some of the accounts had been gaining
access to Twitter without the use of VPNs.
Facebook’s investigation, also announced Monday, was
prompted by a “tip” from Twitter, Facebook head of cybersecurity policy
Nathaniel Gleicher said in a statement.
“We will continue monitoring and will take action if we find
additional violations,” said Gleicher, adding that Facebook had shared
the findings with other industry partners and law enforcement agencies.
Examples of the “coordinated inauthentic behaviour” identified by
Facebook included posts that compared protesters to cockroaches, accused
journalists of corruption and of colluding with “rioters”, and claimed
that protesters, not police, had been responsible for the widely
reported injury of a medic who may lose the use of one eye.
The young woman was injured when she was struck by a pellet fired by police during demonstrations in Hong Kong’s Tsim Sha Tsui neighbourhood earlier this month.
The moves by the two social media giants to counter misinformation
about Hong Kong dovetailed with an announcement from Twitter that it
would no longer accept advertising from state-controlled news media
Though a Monday statement announcing the action did not single out
Chinese state media, government-backed news agency Xinhua has recently
utilised Twitter’s “promoted tweet” service to expand the reach of posts
related to the ongoing unrest in Hong Kong.
In one such promoted tweet published over the weekend, Xinhua tweeted
that “[people from] all walks of life in Hong Kong called for a brake
to be put on the blatant violence and for order to be restored.”
Twitter said on Monday that affected accounts would be given a 30-day
grace period to withdraw from the platform’s advertising products,
after which the company would “stringently enforce these policies.”
A determination of what accounts would be affected by the ban would
be made based on factors including financial ownership, control of
editorial content and direct or indirect exertion of political pressure,
According to The Intercept online investigative magazine, Twitter’s
announcement of the advertising ban came a few hours after The Intercept
contacted the company for comment on its promotion of tweets by Global
Times, a Chinese tabloid published under the auspices of People’s Daily,
the mouthpiece of the Chinese Communist Party.
The Intercept found that Twitter had promoted 50 English-language tweets by Global Times between June and August, including several that sought to change public perceptions about the Chinese government’s measures in Xinjiang, where upwards of one million Uygurs and other ethnic minority groups are reported to have been forcibly detained and subject to political indoctrination.
Facebook will add its name to WhatsApp and Instagram soon.
The Information broke the news before a Facebook spokesperson confirmed directly that the change is indeed happening.
Instagram will soon be known as “Instagram from Facebook”
and WhatsApp will be called “WhatsApp from Facebook”. The new app titles
will appear in Apple’s App Store and Google Play.
The Facebook spokesperson shared that the
company wants to “be clearer about the products and services that are
part of Facebook”.
Earlier this year, Facebook announced that it will enable cross-messaging for WhatsApp, Instagram and Messenger. Stamping its name on WhatsApp and Instagram seems to be the first step in the integration.
On Thursday afternoon at the one-floor house of Nguyễn Thị Liên’s
family in Nghệ An Province’s Nghi Lộc District, things were a little
more crowded than usual.
Relatives and neighbours were packed in, as this was the day a very special person would return home.
For 24 years Liên had not seen her daughter Lê Thị Lan after she had been trafficked to China.
The weather outside may have been scorching hot, but nobody was leaving. This was a special day, a day to remember.
Lan hardly had chance to get out of the car before her mother held her tight. This time, she didn’t want to let go.
“I thought that I would never see her again,” 69-year-old Liên said as tears rolled down her cheek.
“I couldn’t sleep last night because I kept thinking of the moment my daughter come back,” she said.
“My family want to express our sincere thanks to the media who have
helped spread news about my daughter that lead to the reunion.”
Nguyễn Thị Thu, Liên’s neighbour, said she and other residents in the locality thought she was no longer alive.
“We couldn’t believe that Lan would return home. Everyone is very happy and congratulating Lan’s family,” she said.
Being the eldest child in a poor family of six children, when she was
19, Lan went to work as hired labour in Nghĩa Đàn (another district in
Nghệ An Province) to support the family.
But she was tricked and taken to neighbouring Thanh Hóa Province
before transported to China’s Guangxi Province and sold to a 65-year-old
man for VNĐ7 million (S$410).
After 13 years living together with him, Lan had four children with that man, three daughters and a son.
During that time, Lan was regularly beaten and abused by her husband.
She tried to flee many time but did not succeed. She even locked up in a
She was given drugs so that she gradually loss her memory.
Then, Lan was sold to another man, who she has been living for 11 years now.
This man, who is 43 years, treated her very well.
Two years ago, Lan asked her husband to allow her to return hometown
in Việt Nam. Her husband accepted and even gave her some money but she
was tricked out of her cash and never made it home.
Early in July, Lan met a Vietnamese woman who was living in China.
This proved to be a turning point as that woman, from Hòa Bình Province,
helped uploaded a video of Lan on Facebook with the hope that she could
contact with her family.
The video was widely shared and seen by Đặng Thị Thảo, Lan’s sister-in-law.
Although the woman spoke Vietnamese not fluently, she still
remembered the names of her parents, her hometown and expresses her
desire to return to her family, Thảo recalled.
“At first I did not recognise her, but when I heard she talk about
the home address, the names of parents, sisters and brothers, I knew it
was my sister-in-law,” she said.
Once it was confirmed that the woman in the video was Lan, the family reached out and helped Lan recover her memory.
The family has reported the incident to the police with the hope that authorities would do their best to bring Lan back to Việt Nam as soon as possible.
“We persistently encouraged and set up a contact group between the
family, the police and Lan. Gradually, Lan trusted the Vietnamese agency
and the Chinese authorities.”
Only then, could we only bring Lan back home,” he said.
Nghệ An police and authorities were trying to find and support victims returning to their homeland, he said.
Regarding to Lan’s case, the provincial police department would
collect documents and verify her testimony to continue the
Statistics from the criminal police division showed between 12-14
human trafficking cases occurred in the province each year. About 90 per
cent of victims were trafficking to China and forced to be sex workers
or told to marry foreign men.
From November 2015 to April 2018, 34 human trafficking cases were detected resulting in the arrest of 57 suspects.
Tech giants Google and Facebook could be tracking your visits to adult sites even when you set your browser to private or incognito mode, according to the authors of a recent study on privacy standards of porn websites.
The study, titled “Tracking sex: The Implications Of Widespread Sexual Data Leakage And Tracking On Porn Websites”, analysed 22,484 pornography websites and found that 93% leaked user data to third parties.
It found that Google (and its subsidiaries) had trackers on 74% of the porn sites, Facebook on 10% and Oracle on 24%.
A Google spokeswoman told The New York Times that it does not use the information to build advertising profiles.
“We don’t allow Google Ads on websites with adult content and we prohibit personalised advertising and advertising profiles based on a user’s sexual interests or related activities online. Additionally, tags for our ad services are never allowed to transmit personally identifiable information,” said the spokeswoman.
Facebook made a similar statement, while Oracle did not respond to the NYT.
Though it is not clear what the data is being used for, the authors warned that the collection of this type of data is more dangerous and can be used against a person. For instance, the data could be used to damage the reputation of a public figure.
“These risks are heightened for vulnerable populations whose porn usage might be classified as non-normative or contrary to their public life,” said the authors.
They added that the data presented a “unique and elevated risk” as 44.97% of porn site web addresses (or URLs) indicate the nature of the content, potentially revealing the person’s sexual preferences.
In an interview with the NYT, one of the authors, Elena Maris from Microsoft Research, said that the mechanism used for adult site tracking is similar to online stores, and it should be a huge red flag, as it’s much more specific and deeply personal.
The study could only extract the privacy policies of 3,856 sites (17% of the total) and found that they were written in an overly complex manner. It said it “might need a two-year college education to understand them”.
There are also security concerns, as hackers have previously stolen email addresses, passwords, usernames, and credit card information from some of the sites.
“Porn sites currently operate with an unethical definition of sexual consent considering the sensitive sexual data they hold. We contend the overwhelming leakiness and sexual exposure revealed in our results mean porn sites ought to better account for user security as well as adopt policies based on affirmative consent,” said the authors.
They said regulatory intervention could provide better protection, adding that the European Union’s GDPR (General Data Protection Regulation) for online tracking more closely matches norms for sexual consent by emphasising that consent must be affirmative and freely given.
The other authors of the study are Timothy Libert from Carnegie Mellon University and Jennifer Henrichsen from the University of Pennsylvania.
Most of us have probably seen those quizzes online where you can discover your personality, some hidden traits or even just to test your IQ – and some of us can’t resist clicking inside just for fun. Liu, a 45-year-old man in Singapore saw an ad for an IQ quiz while he was scrolling through Facebook on 9th April and got curious.
He clicked inside and started playing by answering 20 questions until he reached the end,Lianhe Zaobao reported. He was requested to fill in his personal details at the end of the quiz, so he proceeded to do so, as he thought that they would send the results over to his email address when he was done.
However, he started to feel something was wrong when the quiz asked for his credit card details. He was surprised as they did not mention that he needed to pay for the quiz, so he quickly exited the page. To his surprise, he received a letter from AG Collection Agency, saying that they have the results of his IQ quiz but he needed to pay SGD59 (RM180).Inside the letter, there was an invoice for the IQ test, instructions on how to pay using Paypal and a certificate indicating the IQ test results alongside some general information regarding the different IQ brackets.
Liu said that he replied to the email saying that he did not fill in his credit card details, and he did not want the IQ test results anymore. Nevertheless, the person who replied him insisted that he pay for it since he had already completed the quiz.
Fed up, he decided to ignore them, but they were relentless as they sent him at least four or five emails in two months, demanding that he should pay up. When he did not reply, they threatened to turn the matter over to a debt collection agency and their legal team.
On 3rd June, they emailed him again, saying that he currently owed them a total of SGD89 (RM272), which includes the aforementioned SGD59 (RM180) and “reminder fees.” In the letter, the company told him that he had five days to clear off his “debts”, otherwise they would send a lawyer letter. He also started receiving a countdown message to remind him to pay up.
As the company had his personal information, Liu was worried that they would do something malicious with these sensitive details. He decided to lodge a police report and also to warn the public about this issue. A check on the internet shows that this scam has actually been around for a few years. A few Norwegian websites have written about this scam as well, and it looks like this one is circulating in Singapore at the moment.
Animal filters make everyone look cute, including boot-faced politicians.
Last Friday, Pakistani minister Shaukat Yousafzai and his colleagues held a press conference to address several pressing issues with the media. As with most politicians today, he used social media to increase audience reach.
But whoever was in charge of streaming the conference on Facebook forgot to turn off the cat filter and boy, these lawmakers looked absolutely adorable.
While the video was quickly deleted from the official Facebook page of Pakistan Tehreek-e-Insaf (PTI) party, screengrabs are still circulating online, leaving a significant milestone in Shaukat’s political career.
Facebook Inc user data is still showing up in places it shouldn’t.
at UpGuard, a cybersecurity firm, found troves of user information
hiding in plain sight, inadvertently posted publicly on Amazon.com Inc’s
cloud computing servers. The discovery shows that a year after the
Cambridge Analytica scandal exposed how unsecure and widely disseminated
Facebook users’ information is online, companies that control that
information at every step still haven’t done enough to seal up private
one instance, Mexico City-based digital platform Cultura Colectiva,
openly stored 540 million records on Facebook users, including
identification numbers, comments, reactions and account names. The
records were accessible and downloadable for anyone who could find them
online. That database was closed on April 3 after Bloomberg alerted
Facebook to the problem and Facebook contacted Amazon. Facebook shares
pared their gains after the Bloomberg News report.
database for a long-defunct app called At the Pool listed names,
passwords and email addresses for 22,000 people. UpGuard doesn’t know
how long they were exposed, as the database became inaccessible while
the company was looking into it.
Facebook shared this kind of information freely with
third-party developers for years, before cracking down more recently.
The problem of accidental public storage could be more extensive than
those two instances. UpGuard found 100,000 open Amazon-hosted databases
for various types of data, some of which it expects aren’t supposed to
“The public doesn’t realise yet that these high-level
systems administrators and developers, the people that are custodians
of this data, they are being either risky or lazy or cutting corners,”
said Chris Vickery, director of cyber risk research at UpGuard. “Not
enough care is being put into the security side of big data.”
Colectiva is a digital platform that posts stories about celebrities
and culture and largely targets a Latin American audience. The company’s
website says it creates content through data and technology and has
more than 45 million followers on Facebook, Instagram, Twitter, YouTube
Facebook for many years allowed anyone making an
app on its site to obtain information on the people using the app, and
those users’ friends. Once the data is out of Facebook’s hands, the
developers can do whatever they want with it.
About a year ago,
Facebook chief executive officer Mark Zuckerberg was preparing to
testify to Congress about a particularly egregious example: A developer
who handed over data on tens of millions of people to Cambridge
Analytica, the political consulting firm that helped Donald Trump on his
presidential campaign. That one instance has led to government probes
around the world, and threats of further regulation for the company.
year, Facebook started an audit of thousands of apps and suspended
hundreds until they could make sure they weren’t mishandling user data.
Facebook now offers rewards for researchers who find problems with its
A Facebook spokesperson said that the
company’s policies prohibit storing Facebook information in a public
database. Once it was alerted to the issue, Facebook worked with Amazon
to take down the databases, the spokesperson said, adding that Facebook
is committed to working with the developers on its platform to protect
In the Cultura Colectiva dataset, which totalled
146 gigabytes, it was difficult for researchers to know how many unique
Facebook users were affected. UpGuard also had trouble working to get
the database closed. The firm sent emails to Cultura Colectiva and
Amazon over many months to alert them to the problem. It wasn’t until
Facebook contacted Amazon that the leak was addressed. Cultura Colectiva
didn’t respond to Bloomberg’s request for comment.
example shows how the data security issues can be amplified by another
trend: the transition many companies have made from running operations
predominantly in their own datacentres to cloud-computing services
operated by Amazon, Microsoft Corp, Alphabet Inc’s Google, and others.
tech giants have built multibillion-dollar businesses by making it easy
for companies to run applications and store troves of data, from
corporate documents to employee information, on remote servers.
like Amazon Web Services’ Simple Storage Service, essentially an
Internet-accessed hard drive, offer clients the choice of whether to
make the data visible to just the person who uploaded it, other members
of their company, or anyone online. Sometimes, that information is
designed to be public-facing, as in the case of a cache of photos or
other images stored for use on a corporate website.
it isn’t. In recent years, information stored on several cloud services
– US military data, personal information of newspaper subscribers and
cell phone users – has been inadvertently shared publicly online and
discovered by security researchers.
Amazon in the last two years
has beefed up protocols to keep customers from exposing sensitive
materials, adding prominent warning notices, making tools for
administrators to more simply turn off all public facing items, and
offering for free what was formerly a paid add-on to check a customer’s
account for exposed data.
“Originally I would have put a lot of
this on AWS,” said Corey Quinn, who advises businesses that use Amazon’s
cloud at the Duckbill Group, a consulting firm. But since Amazon has
taken steps to address the issue, companies like Cultura should be
aware, he said. “With all of this in the news, and all of this
continuing to come out, if you’re still opening AWS buckets [to the
public], you’re not paying attention.”
Amazon isn’t the only company that periodically gets caught up in cases of private records mistakenly made public. But it has a wide lead in the business of selling rented data storage and computing power, putting a spotlight on Seattle-based company’s practices. An Amazon Web Services spokesman declined to comment. – Bloomberg.
Facebook chief executive Mark Zuckerberg called on March 30 for
regulators to play a “more active role” in establishing rules that
govern the Internet, as the world’s largest social media network
struggles to defuse criticism.
Zuckerberg, whose company is under
pressure for failing to adequately police content and protect user
privacy on its platform, wrote in a Washington Post article that a “standardised approach” for removing content would help keep Internet companies “accountable”.
updating the rules for the Internet, we can preserve what’s best about
it – the freedom for people to express themselves and for entrepreneurs
to build new things – while also protecting society from broader harms,”
His comments followed a Washington Post
report saying the US government and Facebook were negotiating a
multibillion-dollar fine settlement over the company’s privacy lapses.
Zuckerberg also called for updated legislation focused on
protecting elections, including new rules aimed at online political
advertising that “reflect the reality of the threats” faced by social
US intelligence and law enforcement agencies say Russian internet trolls helped spread divisive content and disinformation on Facebook in the run-up to the 2016 US presidential election. – Reuters
If you’re currently using Facebook or Instagram, then you might want to pay attention to this new info!
The Star reported that the Malaysian Communications and Multimedia Commission (MCMC) has advised the public to change their Facebook and Instagram passwords if they received a notification to do so.
MCMC is urging people to change their passwords because Facebook revealed on 21 March 2019 that some of their staff can read the passwords which were left in plain text form.
However, Facebook confirmed that these passwords cannot be accessed by an outsider and their staff hadn’t misused the passwords. Nevertheless, to be on the safe side, MCMC has now urged the public to change their passwords if they received a notification asking to change them.
A snippet of their statement, which was released on 24 March 2019, reads,
“Any process to change the passwords should be done on their web pages or applications. This is important, as there is a possibility of parties that will try to take advantage of this situation to con people through deception, disguise and phishing.”
You can read the whole statement here:
Therefore, FB’s vice president of engineering, security and privacy, Pedro Canahuati shared that “hundreds of millions of Facebook Lite users, tens of millions of other Facebook users and tens of thousands of Instagram users” will be notified to change their passwords for the above-mentioned social media apps.
Prior to this, Brian Krebs revealed that 600 million FB and IG users’ passwords were stored in plain text files which could be searched by over 20,000 employees.
FYI, Brian who is from the security news website KrebsOnSecurity cited the information from an unnamed FB source.
According to Krebs, the “archives with unencrypted” passwords dated back to 2012 but the exact number of unencrypted passwords is yet to be figured out. After Krebs’ revelation, FB admitted that many passwords were left vulnerable and it could be accessed by FB’s staff.
Well, we hope that FB will quickly find a solution to this problem as soon as possible. Meanwhile, don’t forget to change your Facebook and Instagram passwords if you received the notification to do so.