Skip to main content

Microsoft releases tool to spot abuse images

Microsoft has released a free tool
that lets website owners spot when
images of child abuse are being
shared by users.
It said it had made the PhotoDNA tool
available to tackle the 720,000 abuse
images uploaded to the net every day.
Police forces, anti-abuse organisations
and large social networks have been using
the tool for some time to dig out the
illegal images.
Microsoft said the online tool was for
small firms that lack the resources to do
image-checking themselves.
Exploited services
Spotting abuse images among the 1.8
billion pictures uploaded to online
services every day was an almost
impossible task, said Courtney Gregoire, a
senior lawyer at Microsoft's Digital
Crimes Unit in a blogpost outlining
the initiative.
While many large social networks such as
Twitter, Facebook and Flipboard were
already using PhotoDNA, before now it
had not been available to smaller online
services, she said.
"We needed an easier, more scalable way
to identify and detect these worst-of-the-
worst images," said Ms Gregoire.
The PhotoDNA system has been used to
analyse and classify images of child sexual
abuse held by Interpol, police forces and
the US National Center of Missing and
Exploited Children.
The technology generates a signature or
hash for each image that can be compared
with any new image to see if there is a
match. It can spot images it has seen
before even if they are cropped or
otherwise manipulated to avoid detection
systems.
Many of the images shared online have
been seen before and spotting people
trading them can help police forces
unearth abusers previously unknown to
them.
The free service puts PhotoDNA in the
cloud and lets websites check images
uploaded by users.
"It's definitely going to help," said
Christian Berg of NetClean which uses the
PhotoDNA technology in the image
analysis software it makes for police
forces and large companies. "Especially
for the smaller firms that cannot afford to
do this themselves.
"Those smaller services are regularly
exploited by people that like to share
abuse images online," he said.

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...