YouTuber Brooke Houts has published a statement this week following claims that she hit and spit on her dog in accidentally-released footage.
In the footage – which was unedited and apparently accidentally uploaded – Houts can be seen reacting when her pet, Sphinx, jumps up while she’s filming.
The backlash was immediate, with viewers including controversial influencer Logan Paul speaking out against Houts.
i try my best to avoid slamming people on twitter because i know what it’s like to be on the receiving end (and rightfully so), but this video of that girl hitting & spitting on her dog is remarkably grotesque, and irks me for many reasons:
— Logan Paul (@LoganPaul) August 7, 2019
To everyone who has been commenting on my social media as of recently: pic.twitter.com/gnxUbfVHdf
— b (@brookehouts) August 7, 2019
The LAPD has confirmed that it is investigating.
Facebook is reportedly testing selling video-on-demand services to users, aiming to compete with the likes of Amazon and Roku.
Woah! Facebook on iOS update just added ability to watch video subscription services!
Is it this? https://t.co/WB5fmuJqDu
— Matt Navarra (@MattNavarra) August 7, 2019
Currently only available to users in the US with an initial pilot comprising BritBox, CollegeHumour Dropout, MotorTrend App, and Tastemade Plus, the feature will be rolling out over the next few weeks.
Facebook will process payments for the partners, which vary from $2.99 to $6.99 a month. It hasn’t confirmed the cut it’ll be taking for doing so.
Security firm Check Point Research has discovered a flaw in WhatsApp that allows hackers to manipulate messages – letting them “put words in [someone’s] mouth”.
A release from the firm reads –
“Towards the end of 2018, Check Point Research notified WhatsApp about new vulnerabilities in the popular messaging application that would enable threat actors to intercept and manipulate messages sent in both private and group conversations, giving attackers the power to create and spread misinformation from what appear to be trusted sources.
The Check Point Research team observed three possible methods of attack exploiting this vulnerability – all of which involve social engineering tactics to fool end-users. A threat actor may:
Use the ‘quote’ feature in a group conversation to change the identity of the sender, even if that person is not a member of the group.
Alter the text of someone else’s reply, essentially putting words in their mouth.
Send a private message to another group participant that is disguised as a public message for all, so when the targeted individual responds, it is visible to everyone in the conversation.
WhatsApp fixed the 3rd vulnerability which enabled threat actors to send a private message to another group participant disguised as a public message for all. But, we found that it is still possible to manipulate quoted messages and spread misinformation from what appear to be trusted sources.”
A Facebook spokesperson responded:
“We carefully reviewed this issue a year ago and it is false to suggest there is a vulnerability with the security we provide on WhatsApp. The scenario described here is merely the mobile equivalent of altering replies in an email thread to make it look like something a person didn’t write. We need to be mindful that addressing concerns raised by these researchers could make WhatsApp less private, such as storing information about the origin of messages.”
PR & social media, with a bit more