
Trapped in social networks
A study reveals that people are tired of social networks, but keep using them because they can’t break the ties.
589 articles
A study reveals that people are tired of social networks, but keep using them because they can’t break the ties.
Photo files typically contain additional data on shooting conditions, including a geotag. What happens to this data when the photo is published online?
Careless behavior online can have devastating personal and financial consequences. Here are seven common shortcuts to avoid.
Social networking sites know a lot more about you than what you post. These two tools can help you figure out how much more.
What are older people doing online, and are they aware of the threats out there?
Germany and India officially challenge changes to WhatsApp’s data-sharing policy.
i-Dressup, a community for teenage girls, is actively leaking passwords in plain text.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.
When Google announced Allo, we thought the search giant was finally paying attention to users’ concerns about privacy. Reality turned to be quite different.
Why questions like “What is your mother’s maiden name?” and “What did you do last summer?” don’t protect you.
What if you have to transmit sensitive data and the only connection is open Wi-Fi? We’ve got you covered.
Hackers have stolen 68 million account credentials from Dropbox dating back to 2012. Here’s what you should do.
Powerful chatbots can replace real-life communication — and take over the world.
One Instagram post with a picture of a ticket can cost you a whole lot of time and money and ruin your day. This is how you can avoid it
Evgeny Chereshnev, professional cyborg, talks about fascinating new jobs that will emerge in the near future.
Lynch law, loss of basic privacy, disgusting marketing, digital identity theft — how else can facial recognition be misused?
Catching criminals, waking up a sleepy driver, stopping teens from buying cigarettes — facial recognition can help us accomplish all that and more.
You could’ve asked our GReAT members whatever you wanted. Here are the best 6 questions and GReAT experts’ answers
Facebook launched Aquila, a solar-powered drone which took its inaugural flight last week. Why does the social network need its own drones and how it is connected to the Google Loon project?
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.