Skip to main content
Special Report

Technology and the Emerging Post-Privacy Era

Computers, databases and networks have connected us like never before, but at what cost?

A Survey Asks: How Much Does Your Privacy Online Matter?

A Survey Asks: How Much Does Your Privacy Online Matter?

Is online anonymity important to you? How far are you willing to go to protect your privacy? These two the key questions are examined in a report released Thursday by the Pew Research Center’s Internet & American Life Project...

September 5, 2013 — Larry Greenemeier

Hackers convene Last HOPE conference in the Big Apple

  Computer programmers, researchers and students descended on New York City's Hotel Pennsylvania today for the HOPE conference, a forum for all things related to security, including a healthy dose of sessions devoted to breaking security...

July 18, 2008 — Larry Greenemeier

Mac Attack Targets Porn Surfers

Does a scheme for stealing personal information from Mac OS X users mean that a few bad Apples are about to spoil the bunch?

November 1, 2007 — Larry Greenemeier

Privacy in an Age of Terabytes and Terror

Introduction to SciAm 's issue on Privacy. Our jittery state since 9/11, coupled with the Internet revolution, is shifting the boundaries between public interest and "the right to be let alone"...

September 1, 2008 — Peter Brown

Planning to E-Vote? Read This First

With less than three months before the presidential election, the hotly contested state, Ohio, along with others, continue to have problems with E-voting technology

August 18, 2008 — Larry Greenemeier

Internet Eavesdropping: A Brave New World of Wiretapping

As telephone conversations have moved to the Internet, so have those who want to listen in. But the technology needed to do so would entail a dangerous expansion of the government's surveillance powers...

September 1, 2008 — Whitfield Diffie and Susan Landau

How Loss of Privacy May Mean Loss of Security

Many issues posing as questions of privacy can turn out to be matters of security, health policy, insurance or self-presentation. It is useful to clarify those issues before focusing on privacy itself...

September 1, 2008 — Esther Dyson

Pedophile-Proof Chat Rooms?

Can Lancaster University's Isis Project keep children safe online without invading our privacy?

August 18, 2008 — Brendan Borrell

How to Disappear from the Web

If you've ever been the victim of identity theft, or a stalker, or you just value your privacy, Tech Talker has the tools to help you ditch the digital age and remove your presence from the web...

June 25, 2014 — Tech Talker Eric Escobar

Secure E-mail Services Shuttered over Fears of Government PRISM Reprisals

Revelations of the U.S. National Security Agency’s PRISM program continue to have worldwide ripple effects. Nearly two months after U.S. federal prosecutors charged NSA whistleblower Edward Snowden with espionage and theft of government property for blowing the lid off of the clandestine surveillance program, the company that secured Snowden’s electronic communications with journalists and international [...]..

August 9, 2013 — Larry Greenemeier

Who's Watching You: The Future of Privacy

Scientific American editor in chief, John Rennie, discusses the future of privacy and security, the subject of the September single-topic issue of Scientific American magazine. Plus, we'll test your knowledge of some recent science in the news...

September 3, 2008 — Steve Mirsky

How I Stole Someone's Identity

The author asked some of his acquaintances for permission to break into their online banking accounts. The goal was simple: get into their online accounts using the information about them, their families and acquaintances that is freely available online...

August 18, 2008 — Herbert H. Thompson
Scroll To Top