
Do Social Networks Bring the End of Privacy?
Young people share the most intimate details of personal life on social-networking Web sites, such as MySpace and Facebook, portending a realignment of the public and the private
Computers, databases and networks have connected us like never before, but at what cost?

Do Social Networks Bring the End of Privacy?
Young people share the most intimate details of personal life on social-networking Web sites, such as MySpace and Facebook, portending a realignment of the public and the private

Internet Eavesdropping: A Brave New World of Wiretapping
As telephone conversations have moved to the Internet, so have those who want to listen in. But the technology needed to do so would entail a dangerous expansion of the government's surveillance powers

Privacy in an Age of Terabytes and Terror
Introduction to SciAm's issue on Privacy. Our jittery state since 9/11, coupled with the Internet revolution, is shifting the boundaries between public interest and "the right to be let alone"

Seven Paths to Regulating Privacy
History is ambiguous about government willingness to protect private life, but a few recommendations can help keep its future secure

Poll: How Safe is Your Information Online
What steps do you take to protect your personal information?

Are You Being Watched? Probably
Looking back at the surveillance all around us--from wiretapped phones to security cameras

Does an Advertiser Know You Clicked on This Story?
Facebook, Yahoo, and Google come under fire for allowing advertisers to follow online consumer behavior to create targeted messages

Who's Keeping an Eye on Your Online Health Records?
Google, Microsoft and other providers of Web-based services for managing health care information promise to keep it secure, but privacy policies vary from site to site

International Report: What Impact Is Technology Having on Privacy around the World?
ScientificAmerican.com, with help from our international colleagues, highlights privacy and security issues in China, Japan, the Middle East, Russia and the U.K.

How I Stole Someone's Identity
The author asked some of his acquaintances for permission to break into their online banking accounts. The goal was simple: get into their online accounts using the information about them, their families and acquaintances that is freely available online

Pedophile-Proof Chat Rooms?
Can Lancaster University's Isis Project keep children safe online without invading our privacy?

Invasion of Privacy: A Conversation with Larry Greenemeier
ScientificAmerican.com's Larry Greenemeier talks about your privacy and the threats to it. See our privacy package online at SciAm.com, as well as the September special single-topic issue of Scientific American. Steve Mirsky reports

Planning to E-Vote? Read This First
With less than three months before the presidential election, the hotly contested state, Ohio, along with others, continue to have problems with E-voting technology

The Web Ushers In New Weapons of War and Terrorism
Protesters, terrorists and warmongers have found the Internet to be a useful tool to achieve their goals. Who will bring law and order to cyberspace?

Apple disses hackers' Black Hat convention

Colorado "Spam King" Dead in Apparent Murder/Suicide
Edward Davidson reportedly shot his wife and daughters before turning the gun on himself after escaping from minimum-security prison

Spying on the Spies [Slide Show]
State Department shows off Cold War-era electronic eavesdropping gadgets

Hackers convene Last HOPE conference in the Big Apple

I Hear Ya: Bush Signs Expanded Wiretap Power into Law
President scores victory in effort to widen scope of federal government's warrantless recon power

Palm-Reading Devices Get Smart about Security
A new biometrics system uses the blood network in the palms of your hand to ID individuals

Space Station Could Beam Secret Quantum Codes by 2014
Researchers outline project to send long-distance, ultrasecure messages on Earth via the International Space Station

Security Breach: Feds Lose Laptop Containing Sensitive Data -- Again
This time, a thief made off with a computer containing unencrypted details of about 2,500 participants in an NIH clinical trial

Heart-Stopper: Could Hackers Hit Pacemakers, Other Medical Implants?
Researchers warn that implantable medical devices could be vulnerable to cyber strikes

Many States Elect Not to Use Flawed E-Voting Technology
Eight years after the controversial 2000 presidential election, electronic voting systems still fail to deliver on their promise of accuracy and security