An estimated 870 million people are calorie deficient, but that figure doesnt represent the entire number of people affected by food insecurity.
In many ways "big data" and "encryption" are antithetical. The former involves harvesting, storing and analyzing information to reveal patterns that researchers, law enforcement and industry can use to their benefit.
You're probably on tenterhooks wondering what will happen to your reliable, convenient ATM on April 8, the day Microsoft officially sticks a fork in its hugely popular Windows XP operating system.
There was a pretty huge response to my take on the GMO labeling debate last Friday. At the time of writing, there are 37 comments (for comparison, my other posts here have had between 0 and 4 comments), and I had a couple of convergent conversations on twitter and google+.
Today, maintaining privacy without guided assistance is an onerous task, whose initial costs are high, immediate rewards low and solutions fragile and constantly evolving.
Looking back at the surveillance all around us--from wiretapped phones to security cameras
Noted historian of technology George Dyson has a thought-provoking piece in Edge where he takes government surveillance to task, not just on legal or moral grounds but on basic technical ones.
The relationship between HIV/AIDS and food security is incredibly complex. For this guest post, I invited two experts on this issue to share their knowledge, insight, and experience.
The Super Bowl poses mammoth security challenges in any given year. This years championship gamethe first since last Aprils Boston Marathon bombingraises the stakes by bringing the game, which the Department of Homeland Security designates a Level One national security event, to New Jerseys MetLife Stadium.
Is online anonymity important to you? How far are you willing to go to protect your privacy? These two the key questions are examined in a report released Thursday by the Pew Research Center’s Internet & American Life Project.
For years, I’ve been getting e-mails from people who praise my brilliant research on terrorism and then ask me tough questions about the topic
Tech Talker: Quick and Dirty Tips to Navigate the Digital World
If you've ever been the victim of identity theft, or a stalker, or you just value your privacy, Tech Talker has the tools to help you ditch the digital age and remove your presence from the web.
Web and mobile phone users willingly share personal data in exchange for free stuff, but not everyone is ready to throw in the towel on privacy
2011 Lemelson-M.I.T. Student Inventor Prizes Offer a Glimpse of the Future in Medical and Security Screening Tech [Slide Show]
Automatic gear shifting for safer and more efficient wheelchairs; a technique for harnessing terahertz spectroscopy; "humanized" lab mice; and cheaper, more accurate malaria testing--meet this year's crop of Lemelson-M.I.T. collegiate student prize winners
Airport security breaches on and after 9/11 have led to the continual advancement of technologies such as millimeter wave imaging and backscatter scanners to prevent future tragedies
Wallets, wreckage and digital coin. Before the new year appears, let's look at some of the most important technology stories Scientific American covered over the past 12 months.
Details about where and when you use your credit card could help reveal your identity to data thieves—even if they don't know your name, address and other personal information.
In the U.S., much of the energy dialogue has been around the inherent risk in depending on other countries to meet its energy needs. But, in Luxembourg – a country that imports essentially ALL of its energy supply – “energy security” takes an even more prominent role.
How can science deliver solutions to global development problems? That was the question before us at one of the panels I moderated during the World Economic Forum’s Annual Meeting of New Champions 2013, or “Summer Davos,” the week of September 9 in Dalian, China.