Today, maintaining privacy without guided assistance is an onerous task, whose initial costs are high, immediate rewards low and solutions fragile and constantly evolving.
In many ways "big data" and "encryption" are antithetical. The former involves harvesting, storing and analyzing information to reveal patterns that researchers, law enforcement and industry can use to their benefit.
Looking back at the surveillance all around us--from wiretapped phones to security cameras
I want so badly to love Pinterest, but we just don’t seem to be compatible lovers. My initial objection to their service was the cavalier way in which they claimed rights to creative work displayed on their site (almost certainly a relic of being a new startup and writing the broadest terms of service they [...]
One of the Internet's greatest assets is also perhaps its biggest curse—it never forgets. Except in the European Union, where a court last month ruled that people have the right to have certain sensitive information about themselves deleted from Google search results.
Is online anonymity important to you? How far are you willing to go to protect your privacy? These two the key questions are examined in a report released Thursday by the Pew Research Center’s Internet & American Life Project.
Web and mobile phone users willingly share personal data in exchange for free stuff, but not everyone is ready to throw in the towel on privacy
2011 Lemelson-M.I.T. Student Inventor Prizes Offer a Glimpse of the Future in Medical and Security Screening Tech [Slide Show]
Automatic gear shifting for safer and more efficient wheelchairs; a technique for harnessing terahertz spectroscopy; "humanized" lab mice; and cheaper, more accurate malaria testing--meet this year's crop of Lemelson-M.I.T. collegiate student prize winners
Airport security breaches on and after 9/11 have led to the continual advancement of technologies such as millimeter wave imaging and backscatter scanners to prevent future tragedies
Details about where and when you use your credit card could help reveal your identity to data thieves—even if they don't know your name, address and other personal information.
Revelations of the U.S. National Security Agency’s PRISM program continue to have worldwide ripple effects. Nearly two months after U.S. federal prosecutors charged NSA whistleblower Edward Snowden with espionage and theft of government property for blowing the lid off of the clandestine surveillance program, the company that secured Snowden’s electronic communications with journalists and international [...]
It’s a marvelous time to be a photographer. The blossoming tech industry has made us all kids in a candy shop, suddenly realizing the whole street is candy shops, on a street with peppermint cobblestones and licorice fountains.
Many of the Web sites we visit every day are under cyber attack by malicious hackers looking to disrupt business transactions, discourage people from using a particular online service or exact payback for some real or perceived slight.
The Heartbleed Internet security flaw has made a mess that might not be cleaned up for awhile
A satellite imaging company provides clear new pix of features on Earth's surface as India mulls the role played by such imagery in the deadly Mumbai attacks
A recent shift in U.S. military strategy and provocative actions by china threaten to ignite a new arms race in space. But would placing weapons in space be in anyone's national interest?
A recent report from Europol's European Cybercrime Center includes a forecast that the world's first "online murder" will likely occur before the end of 2014.
Kylie ran towards her fallen dragonfly and knelt beside it. One of its four wings had snapped nearly in half. She rummaged through a toolbox until she found a small tube of accelerseal, bit off the cap and squeezed a generous amount onto the wing’s fracture, holding the two pieces together.
To protect your financial and personal data, most mobiles come with PIN-based security, biometrics or number grids that require you to retrace a particular pattern to access your device.