Ever gotten an email offering to pay you to publish links on your blog? This black hat SEO trick could get you in hot water with search engines
This low-cost Android-powered PC lets parents remotely control their kids' computer use. It's a nice idea, but it's not quite ready for prime time.
Dear Internet bots and sockpuppets: Your days are numbered, because the Beehive ID service is out to spot the frauds online.
A recent study by the Direct Marketing Association is interesting in what it doesn't reveal about how it buys and sells your personal data to parties that want to sell to you.
Are you an open sharer, a passive user, or a proactive protector? How and where you surf says a lot about how much you value privacy
LexisNexis, Kroll, and Dunn & Bradstreet have been thoroughly pwned by identity stealing hackers. Who pays the price? You and me.
What does Acxiom know about you? More than you think, not all of it true, but AboutTheData.com lets you peel back the cover of the data mining giant and look inside.
Cell phone security varies significantly among jurisdictions. Here are the current rules and some of the concerns.
To keep supercomputers from reading your email, use a font the robots can't read.
In the grand scheme of digital security, passwords have become self-defeating, often impotent tools. We need too many of them, and the strong ones are too hard to remember. Luckily, however, you can improve today's passwords with proper management, and tomorrow's security tech may eliminate passwords completely.
Future cars will be networked, personalized, and connected to the cloud ... and collecting personal data about our preferences and our whereabouts.
Analysis: Not to get paranoid, but we try to determine why a Bostonian discovered mystery Facebook logins from Washington, D.C., some 450 miles away.
Articles by Dan TynanNext Page