Companies are bombarded with phishing scams every day.
A NASA scientist heading home to the U.S. said he was detained in January at a Houston airport, where Customs and Border Protection officers pressured him for access to his work phone and its potentially sensitive contents.
This week’s WikiLeaks release of what is apparently a trove of Central Intelligence Agency information related to its computer hacking should surprise no on.
Since 2009, U.S. Customs and Border Protection agents have been allowed to search electronic devices carried by citizens or noncitizens as they cross the border into the United States from other countries.
Wearing a fitness tracking device could earn you cash from your health insurance company. At first, this sounds lucrative for the people who participate, and good for the companies, who want healthier insurance customers.
Having access to the internet is increasingly considered to be an emerging human right. The United Nations has taken note of the crucial role of internet connectivity in “the struggle for human rights.”
As you browse the internet, online advertisers track nearly every site you visit, amassing a trove of information on your habits and preferences.
Every January, I do a digital tune-up, cleaning up my privacy settings, updating my software and generally trying to upgrade my security.
Facebook has long let users see all sorts of things the site knows about them, like whether they enjoy soccer, have recently moved, or like Melania Trump.
At the touch of an app, Emma tracks her diabetes. She enters food, exercise, weight and blood sugar levels, then sets up medication reminders.
Rogue One: A Star Wars Story, which opens in theaters this weekend, shows how the Rebel Alliance steals architectural plans for the Death Star in order to eventually destroy it.
The age of digital technology, in which we can search and retrieve more information than we could in any previous era, has triggered a debate over whether we have too much information. Is the cure to “unpublish” things we think are wrong or out of date? Ought we have a “right to be forgotten”?
Kryptowire, a security firm, recently identified several models of Android mobile devices that have preinstalled permanent software, known as firmware, that serve as backdoor that collects sensitive personal data, including text messages, geolocations, contact lists, call logs and transmits them to a third-party server in Shanghai, China.
When it comes to theft online, “you’re only protected by other, easier victims,” says Hsinchun Chen, an expert in cybersecurity.
Enabled by exponential technological advancements in data storage, transmission and analysis, the drive to “datify” our lives is creating an ultra-transparent world where we are never free from being under surveillance.
We live in an interconnected age where wirelessly controlled computing devices make almost every aspect of our lives easier, but they also make us vulnerable to cyber-security attacks. Today, nearly everything can be hacked, from cars to lightbulbs
When Yahoo! confirmed that it had experienced a massive online attack from hackers who stole personal information from more than 500 million people — including names, emails and phone numbers — it revealed a disturbing truth about our digital media system.
Imagine, if you can, a period long before today’s internet-based connectivity. Imagine that, in that distant time, the populations of every country were offered a new plan.
Drone footage is everywhere, whether used to film extreme sports, outdoor events, nature, music festivals, or just for its own sake.
Fear of hackers reading private emails in cloud-based systems like Microsoft Outlook, Gmail or Yahoo has recently sent regular people and public officials scrambling to delete entire accounts full of messages dating back years.
President Obama has promised to support a bold future for medicine where diagnostic testing and treatments aren’t just what’s best for most people – they’re what’s best for you.
A new study reveals employers are using online information about job applicants without their knowledge, to inform hiring decisions. Approximately 55% of organizations now have a policy about this type of practice, called profiling.
For more than two decades, people have used the internet to research, shop, make friends, find dates, and learn about the world. And third parties have been watching—and learning.