Privacy
Get full coverage of the latest technology breakthroughs, governmental policies, legislation, and best practices that affect the private data of users and corporations.
Articles about Privacy
-
The insecurity of private email services
The Indian government wants to ban the use of Gmail for official use, due in part to leaks about NSA snooping, but the general insecurity of private email services makes this a sound policy.
-
Escaping the dragnet of surveillance: What the experts say about encryption
Just-released documents by the Guardian explain how intelligence agencies collude with technology companies to thwart Internet-based encryption protocols.
-
What NSA's PRISM means for social media users
The PRISM program brings an important point about social media use to the forefront: be discerning about what you post online.
-
Hazy cloud contracts are hurting everyone: Four ways to put them right
Dissatisfaction about cloud contracts is not going away and their inherent ambiguities will end up hurting providers as much as buyers.
-
Scan, track, and control how apps access your personal data
With Online Privacy Shield, you can scan the apps on your device, find out what information they're using, and control what each service can see.
-
Email encryption: Using PGP and S/MIME
For those worried about the security and privacy of email communications, encryption is one layer to add, but using encryption software isn't terribly user-friendly.
-
Band of brothers: Vendor partnerships strengthen security for all
Security vendors who band together on solutions instead of persisting in adversarial relationships with one another should be the favored providers for IT departments.
-
Peering behind the shroud of online and social media privacy
The privacy landscape online and on social media is being affected by more than governments, and even the idea of privacy rights on social media may be exaggerated.
-
Why 'Nothing to Hide' misrepresents online privacy
A legal research professor explains to Michael P. Kassner why we should think long and hard before subscribing to the "Nothing to Hide" defense of surveillance and data-gathering.
-
Cyberwarfare: Mounting a defense
Both private and public organizations are at risk for cyberwarfare attacks and must take responsibility for network defense. Tom Olzak outlines security best practices.
-
Does using encryption make you a bigger target for the NSA?
Fact: The U. S. government is capturing data from its citizens. Fact: Encrypted data is of more interest to the U.S. government. Michael P. Kassner asks two experts, one legal, one cryptographic, what...
-
Everything you need to know about using TOR
TOR's anonymizing and encrypting features make it a very useful tool for privacy. Here's a quick look at the basics.
-
[Infographic] Wiretapping: Privacy vs. security
This infographic traces the history of the privacy vs. security debate in the U.S. from the Bill of Rights to PRISM.
-
Cyberwarfare: Characteristics and challenges
The specter of cyberwarfare isn't just a problem for governments -- many types of organizations could be in the line of fire. Knowing the types of attacks and their probability will help you prepare.
-
Convenience or security: You can't have both when it comes to Wi-Fi
Open Wi-Fi networks can be a godsend when you need them. Michael P. Kassner interviews a network-security expert who explains why bad guys like them even more.