ADVERTISEMENT
  About the SA Blog Network

Posts Tagged "privacy"

Anthropology in Practice

Facebook as a MMORPG? Playing Pretend Online

Fairy? Rockstar? Why not both? How do you present yourself online? | Photo by Kristina Killgrove,

“Go ahead,” he said. “I know in a little bit you’re going to go post some smart ass comment on Facebook.” He could not keep the scorn from his voice. “And everyone will sympathize with you. And I’ll look like the bad guy.” Her jaw tightened. “I have never called you out on Facebook,” she [...]

Keep reading »
@ScientificAmerican

Newest Scientific American E-Book Ripped from the Headlines: Cyber Hacking: Wars in Virtual Space

cyber hacking ebook cover

From media and communications to banking, an increasing number of our daily activities is performed online. While this transformation has raised the curtain on exciting new frontiers, it also opens doors to security threats undreamed of by previous generations. In Scientific American’s newest eBook, Cyber Hacking: Wars in Virtual Space, we peer behind the scenes [...]

Keep reading »
Brainwaves

The Year Drones Ruined Christmas

drones

Kylie ran towards her fallen dragonfly and knelt beside it. One of its four wings had snapped nearly in half. She rummaged through a toolbox until she found a small tube of accelerseal, bit off the cap and squeezed a generous amount onto the wing’s fracture, holding the two pieces together. Above her Mark’s velociropter [...]

Keep reading »
Guest Blog

High-Altitude Surveillance Drones: Coming to a Sky Near You

Last week President Obama signed a sweeping aviation bill that, among other things, will open the skies to “unmanned aircraft systems,” more commonly known as drones. Much of the discussion regarding the coming era of domestic drones has been focused on the many important questions regarding their use at low altitudes. To what extent will [...]

Keep reading »
Observations

How to Reconcile Big Data and Privacy

White House image, courtesy of CC-BY-SA-3.0/Matt H. Wade

In many ways “big data” and “encryption” are antithetical. The former involves harvesting, storing and analyzing information to reveal patterns that researchers, law enforcement and industry can use to their benefit. The goal of the latter is to obscure that data from prying eyes. That tension was at the core of a conference this week [...]

Keep reading »
Observations

How Hackers Take Down Web Sites [Video]

Courtesy of Scientific American

Many of the Web sites we visit every day are under cyber attack by malicious hackers looking to disrupt business transactions, discourage people from using a particular online service or exact payback for some real or perceived slight. One of the most common ways to bring down a site is to flood its computer servers [...]

Keep reading »
Observations

A Survey Asks: How Much Does Your Privacy Online Matter?

privacy,security,Web,Internet

Is online anonymity important to you? How far are you willing to go to protect your privacy? These two the key questions are examined in a report released Thursday by the Pew Research Center’s Internet & American Life Project. Entitled “Anonymity, Privacy, and Security Online,” the study found that most Internet users take some measures [...]

Keep reading »
Observations

Secure E-Mail Services Shuttered over Fears of Government PRISM Reprisals

security,privacy,email,nsa

Revelations of the U.S. National Security Agency’s PRISM program continue to have worldwide ripple effects. Nearly two months after U.S. federal prosecutors charged NSA whistleblower Edward Snowden with espionage and theft of government property for blowing the lid off of the clandestine surveillance program, the company that secured Snowden’s electronic communications with journalists and international [...]

Keep reading »
Observations

WikiLeaks Defends NSA Whistleblower, Condemns PRISM Digital Surveillance

WikiLeaks founder Julian Assange held a press conference Monday to weigh in on Edward Snowden’s actions and comment on his organization’s role in helping the National Security Agency whistleblower seek asylum in Ecuador. Assange, who himself has been holed up in Ecuador’s British embassy for the past year to avoid prosecution for WikiLeaks work, defended [...]

Keep reading »
Observations

Is It Possible to Keep Electronic Secrets?

Cellphone lit up

Unless you live under a rock, you’ve heard of PRISM, a vast digital surveillance program run by the National Security Agency that was recently revealed by a whistleblower. The NSA, part of the federal government, reportedly works in conjunction with corporations such as Google, Microsoft and Apple to share users’ information with federal authorities. But [...]

Keep reading »
Observations

Editorial: Chief Justices Should Not Allow DNA Collection During an Arrest Booking

  The Supreme Court is scheduled to hear arguments this week about whether law enforcement officials have a constitutional right to collect DNA after an arrest and before a person has been convicted of a crime. The argument in favor of this practice holds that it is no different than fingerprinting during a booking procedure. [...]

Keep reading »
Observations

How Much Control Will We Have over Our Personal Data?

http://www.flickr.com/photos/yourdon/3405811164/

The flood of online data about each of us seems to be increasing exponentially. For the most part we’re willing participants, lured by the promise of convenience and information. But how much control will we have over the data that we give up? Michael Fertik, CEO of Reputation.com, which is in the business of giving [...]

Keep reading »
Observations

How to Tell Who’s Tracking You Online

Earlier today Mozilla introduced Collusion, an add-on for the Firefox browser that shows you how companies are tracking you as you surf the Web. A cool visual demonstration of the software illustrates all the links that form as you crisscross just a few popular sites online, including IMDB, the New York Times and the Huffington [...]

Keep reading »
Observations

How Do You Hack Into Someone’s Voice Mail?

phone hack, mobil, wireless, security, privacy

The scandal that helped shutter Rupert Murdoch’s News of the World tabloid and left at least nine News International journalists facing possible criminal charges has brought phone hacking into the spotlight as a means of subversively gathering information for news articles. As investigators study the scope of the problem, including the role phone hacking played [...]

Keep reading »
Symbiartic

If Only Pinterest Would Show Me More Ads… Said No One, EVER.

13-030FEATURE

I want so badly to love Pinterest, but we just don’t seem to be compatible lovers. My initial objection to their service was the cavalier way in which they claimed rights to creative work displayed on their site (almost certainly a relic of being a new startup and writing the broadest terms of service they [...]

Keep reading »

More from Scientific American

Scientific American MIND iPad

Give a Gift & Get a Gift - Free!

Give a 1 year subscription as low as $14.99

Subscribe Now >>

X

Email this Article

X