ADVERTISEMENT
  About the SA Blog Network

Posts Tagged "privacy"

Anthropology in Practice

Facebook as a MMORPG? Playing Pretend Online

Fairy? Rockstar? Why not both? How do you present yourself online? | Photo by Kristina Killgrove,

“Go ahead,” he said. “I know in a little bit you’re going to go post some smart ass comment on Facebook.” He could not keep the scorn from his voice. “And everyone will sympathize with you. And I’ll look like the bad guy.” Her jaw tightened. “I have never called you out on Facebook,” she [...]

Keep reading »
@ScientificAmerican

Newest Scientific American E-Book Ripped from the Headlines: Cyber Hacking: Wars in Virtual Space

cyber hacking ebook cover

From media and communications to banking, an increasing number of our daily activities is performed online. While this transformation has raised the curtain on exciting new frontiers, it also opens doors to security threats undreamed of by previous generations. In Scientific American’s newest eBook, Cyber Hacking: Wars in Virtual Space, we peer behind the scenes [...]

Keep reading »
Brainwaves

The Year Drones Ruined Christmas

drones

Kylie ran towards her fallen dragonfly and knelt beside it. One of its four wings had snapped nearly in half. She rummaged through a toolbox until she found a small tube of accelerseal, bit off the cap and squeezed a generous amount onto the wing’s fracture, holding the two pieces together. Above her Mark’s velociropter [...]

Keep reading »
Guest Blog

A Guardian “Agent” to Protect You from Digital Fraud

The orignial GORT, a member of an interstellar police force in the 1951 science fiction film "The Day the Earth Stood Still". (Credit Peter Petrus via Flickr)

Today, maintaining privacy without guided assistance is an onerous task, whose initial costs are high, immediate rewards low and solutions fragile and constantly evolving. The moment after perfectly balancing your Facebook privacy settings, a new “feature” is introduced and suddenly potential employers can view your bachelor party photos. While you admit you should password protect [...]

Keep reading »
Guest Blog

High-Altitude Surveillance Drones: Coming to a Sky Near You

Last week President Obama signed a sweeping aviation bill that, among other things, will open the skies to “unmanned aircraft systems,” more commonly known as drones. Much of the discussion regarding the coming era of domestic drones has been focused on the many important questions regarding their use at low altitudes. To what extent will [...]

Keep reading »
Observations

Squiggly Lines Secure Smartphones

Researchers studied the practicality of using free-form gestures for access authentication on smart phones and tablets. Image courtesy of Michael Sherman, Gradeigh Clark, Yulong Yang, Shridatt Sugrim, Arttu Modig, Janne Lindqvist, Antti Oulasvirta, and Teemu Roos; Rutgers University, Max-Planck Institute for Informatics and University of Helsinki.

To protect your financial and personal data, most mobiles come with PIN-based security, biometrics or number grids that require you to retrace a particular pattern to access your device. But is that good enough in crowded places full of spying eyes? Not necessarily, according to a team of researchers from Rutgers University in New Jersey, [...]

Keep reading »
Observations

Google Gives the Internet Amnesia in Europe

Logo of the Court of Justice of the European Union courtesy of Wikimedia Commons.

One of the Internet’s greatest assets is also perhaps its biggest curse—it never forgets. Except in the European Union, where a court last month ruled that people have the right to have certain sensitive information about themselves deleted from Google search results. (pdf) As of Tuesday morning, the region’s most popular search engine has received [...]

Keep reading »
Observations

How to Reconcile Big Data and Privacy

White House image, courtesy of CC-BY-SA-3.0/Matt H. Wade

In many ways “big data” and “encryption” are antithetical. The former involves harvesting, storing and analyzing information to reveal patterns that researchers, law enforcement and industry can use to their benefit. The goal of the latter is to obscure that data from prying eyes. That tension was at the core of a conference this week [...]

Keep reading »
Observations

How Hackers Take Down Web Sites [Video]

Courtesy of Scientific American

Many of the Web sites we visit every day are under cyber attack by malicious hackers looking to disrupt business transactions, discourage people from using a particular online service or exact payback for some real or perceived slight. One of the most common ways to bring down a site is to flood its computer servers [...]

Keep reading »
Observations

A Survey Asks: How Much Does Your Privacy Online Matter?

privacy,security,Web,Internet

Is online anonymity important to you? How far are you willing to go to protect your privacy? These two the key questions are examined in a report released Thursday by the Pew Research Center’s Internet & American Life Project. Entitled “Anonymity, Privacy, and Security Online,” the study found that most Internet users take some measures [...]

Keep reading »
Observations

Secure E-Mail Services Shuttered over Fears of Government PRISM Reprisals

security,privacy,email,nsa

Revelations of the U.S. National Security Agency’s PRISM program continue to have worldwide ripple effects. Nearly two months after U.S. federal prosecutors charged NSA whistleblower Edward Snowden with espionage and theft of government property for blowing the lid off of the clandestine surveillance program, the company that secured Snowden’s electronic communications with journalists and international [...]

Keep reading »
Observations

WikiLeaks Defends NSA Whistleblower, Condemns PRISM Digital Surveillance

WikiLeaks founder Julian Assange held a press conference Monday to weigh in on Edward Snowden’s actions and comment on his organization’s role in helping the National Security Agency whistleblower seek asylum in Ecuador. Assange, who himself has been holed up in Ecuador’s British embassy for the past year to avoid prosecution for WikiLeaks work, defended [...]

Keep reading »
Observations

Is It Possible to Keep Electronic Secrets?

Cellphone lit up

Unless you live under a rock, you’ve heard of PRISM, a vast digital surveillance program run by the National Security Agency that was recently revealed by a whistleblower. The NSA, part of the federal government, reportedly works in conjunction with corporations such as Google, Microsoft and Apple to share users’ information with federal authorities. But [...]

Keep reading »
Observations

Editorial: Chief Justices Should Not Allow DNA Collection During an Arrest Booking

  The Supreme Court is scheduled to hear arguments this week about whether law enforcement officials have a constitutional right to collect DNA after an arrest and before a person has been convicted of a crime. The argument in favor of this practice holds that it is no different than fingerprinting during a booking procedure. [...]

Keep reading »
Observations

How Much Control Will We Have over Our Personal Data?

http://www.flickr.com/photos/yourdon/3405811164/

The flood of online data about each of us seems to be increasing exponentially. For the most part we’re willing participants, lured by the promise of convenience and information. But how much control will we have over the data that we give up? Michael Fertik, CEO of Reputation.com, which is in the business of giving [...]

Keep reading »
Symbiartic

If Only Pinterest Would Show Me More Ads… Said No One, EVER.

13-030FEATURE

I want so badly to love Pinterest, but we just don’t seem to be compatible lovers. My initial objection to their service was the cavalier way in which they claimed rights to creative work displayed on their site (almost certainly a relic of being a new startup and writing the broadest terms of service they [...]

Keep reading »

More from Scientific American

Scientific American Holiday Sale

Give a Gift &
Get a Gift - Free!

Give a 1 year subscription as low as $14.99

Subscribe Now! >

X

Email this Article

X