Do you promise to tell the truth on however many phones you carry?
In many ways "big data" and "encryption" are antithetical. The former involves harvesting, storing and analyzing information to reveal patterns that researchers, law enforcement and industry can use to their benefit.
There are ways to protect personal information while still enjoying much of what the Web has to offer
Is online anonymity important to you? How far are you willing to go to protect your privacy? These two the key questions are examined in a report released Thursday by the Pew Research Center’s Internet & American Life Project.
Should the FBI be able to break into private electronic communications via existing software vulnerabilities?
There are effective ways to encrypt data, whether it is in transit or in storage, but if that data is left in the clear at any point along its path, it is vulnerable to theft or tampering
As debate over the use of unmanned aerial vehicles in the U.S. rages on, a fashion designer introduces clothing that blocks drone-mounted infrared cameras
A guy stole my iPhone. I tracked it and posted his address online. Was that wrong?
ScientificAmerican.com's Larry Greenemeier talks about your privacy and the threats to it. See our privacy package online at SciAm.com, as well as the September special single-topic issue of Scientific American. Steve Mirsky reports
State Department shows off Cold War-era electronic eavesdropping gadgets
Eight years after the controversial 2000 presidential election, electronic voting systems still fail to deliver on their promise of accuracy and security
President scores victory in effort to widen scope of federal government's warrantless recon power
A new biometrics system uses the blood network in the palms of your hand to ID individuals
Although a cyber war has yet to be declared, there have been plenty of online skirmishes
In a move that could backfire, according to one security expert, Apple pulled out of a prominent hackers' convention taking place this week in Las Vegas.
Computer programmers, researchers and students descended on New York City's Hotel Pennsylvania today for the HOPE conference, a forum for all things related to security, including a healthy dose of sessions devoted to breaking security.
Deep Siren technology would let submarines communicate with ships and shore without compromising stealth
Edward Davidson reportedly shot his wife and daughters before turning the gun on himself after escaping from minimum-security prison
Does a scheme for stealing personal information from Mac OS X users mean that a few bad Apples are about to spoil the bunch?
Researchers outline project to send long-distance, ultrasecure messages on Earth via the International Space Station
Researchers warn that implantable medical devices could be vulnerable to cyber strikes
Efforts to untie AT&T's exclusive service-provider agreement with Apple's iPhone are an interesting exercise to prove it can be done. But how many iPhone customers will take advantage of this?
Protesters, terrorists and warmongers have found the Internet to be a useful tool to achieve their goals. Who will bring law and order to cyberspace?
Introduction to SciAm's issue on Privacy. Our jittery state since 9/11, coupled with the Internet revolution, is shifting the boundaries between public interest and "the right to be let alone"
ScientificAmerican.com, with help from our international colleagues, highlights privacy and security issues in China, Japan, the Middle East, Russia and the U.K.
This time, a thief made off with a computer containing unencrypted details of about 2,500 participants in an NIH clinical trial
With less than three months before the presidential election, the hotly contested state, Ohio, along with others, continue to have problems with E-voting technology
History is ambiguous about government willingness to protect private life, but a few recommendations can help keep its future secure
A versatile assortment of computational techniques can protect the privacy of your information and online activities to essentially any degree and nuance you desire
Security systems based on anatomical and behavioral characteristics may offer the best defense against identity theft
Night-vision cameras, biometric sensors and other gadgets already give snoops access to private spaces. Coming soon: palm-size "bug-bots"
Mashing everyone's personal data, from credit card bills to cell phone logs, into one all-encompassing digital dossier is the stuff of an Orwellian nightmare. But it is not as easy as most people assume
What steps do you take to protect your personal information?
A privacy activist argues that the devices pose new security risks to those who carry them, often unwittingly
As telephone conversations have moved to the Internet, so have those who want to listen in. But the technology needed to do so would entail a dangerous expansion of the government's surveillance powers
Facebook, Yahoo, and Google come under fire for allowing advertisers to follow online consumer behavior to create targeted messages
Google, Microsoft and other providers of Web-based services for managing health care information promise to keep it secure, but privacy policies vary from site to site
Young people share the most intimate details of personal life on social-networking Web sites, such as MySpace and Facebook, portending a realignment of the public and the private
In spite of recent legislation, tougher laws are needed to prevent insurers and employers from discriminating on the basis of genetic tests
Looking back at the surveillance all around us--from wiretapped phones to security cameras
Many issues posing as questions of privacy can turn out to be matters of security, health policy, insurance or self-presentation. It is useful to clarify those issues before focusing on privacy itself
Can Lancaster University's Isis Project keep children safe online without invading our privacy?
Experts from Sun, Adobe, Microsoft and MacAfee discuss how to protect against more numerous and sophisticated attacks by hackers; security professionals call for upgraded technology, along with more attention to human and legal factors
If you've ever been the victim of identity theft, or a stalker, or you just value your privacy, Tech Talker has the tools to help you ditch the digital age and remove your presence from the web.
If passed, such a law would have a costly and damaging effect on research
Without explicit safeguards, your personal biometric data are destined for a government database
Revelations of the U.S. National Security Agency’s PRISM program continue to have worldwide ripple effects. Nearly two months after U.S. federal prosecutors charged NSA whistleblower Edward Snowden with espionage and theft of government property for blowing the lid off of the clandestine surveillance program, the company that secured Snowden’s electronic communications with journalists and international [...]
EDLs contain a RFID chip and let you rapidly reenter the U.S. at a land border without needing a passport. Proponents in California want to alleviate congestion at the Mexico border. Opponents worry about privacy. Larry Greenemeier reports
A factory reset may not be enough to wipe the data from a smart phone you're planning to recycle. Larry Greenemeier reports
The outdated 1986 Electronic Communications Privacy Act considers e-mail "abandoned" and searchable if it's stored for more than 180 days on a server. Larry Greenemeier reports
In this episode Carnegie Mellon University computer scientist Latanya Sweeney talks about the changes in privacy due to data collection and approaches to protect privacy in the future, with Scientific American contributor Chip Walter. Plus we'll test your knowledge of some recent science in the news. Websites mentioned in this episode include privacy.cs.cmu.edu; www.chipwalter.com
Scientific American editor in chief, John Rennie, discusses the future of privacy and security, the subject of the September single-topic issue of Scientific American magazine. Plus, we'll test your knowledge of some recent science in the news. Web sites mentioned in this episode include www.SciAm.com/sciammag; www.snipurl.com/sciamfootball
The author asked some of his acquaintances for permission to break into their online banking accounts. The goal was simple: get into their online accounts using the information about them, their families and acquaintances that is freely available online