Google recently published a patent to use facial recognition and social networking combined to give visual search results.
Does a code of ethics still exist in Intelligence firms? Does it disappear behind closed doors, dirty deeds done in the dark and used against the American people who are supposed to be free to express themselves?
Millions of passwords have been breached and when information that is supposed to be private becomes public, it can open the way to identity theft.
Widgets are used by millions of legitimate websites to deliver content and advertising. But attackers are using widgets for evil intent and infection, warned a security researcher at Black Hat DC.
The EFF opposes new rules proposed by the Financial Crimes Enforcement Network that would pry into users' privacy if they send any money overseas electronically.
If you are not "authorized" personnel, but you have read, written about, commented upon, tweeted, spread links by "liking" on Facebook, shared by email, or otherwise discussed "classified" information disclosed from WikiLeaks, you could be implicated for crimes under the U.S. Espionage Act
The Office of Inspector General found "serious" security breaches at NASA centers after computers were sold with sensitive data still on them.
Some security tips, whether you plan on drinking and typing or not.
After a Taiwanese athlete was disqualified for misplacing her foot sensors in a taekwondo tournament, Taiwanese hackers attacked the Asian Taekwondo Union's Website and demanded the gold medal.
Experts predict it's "inevitable" that malicious attackers will attempt to craft Stealing Reality malware that will be much more dangerous and much harder to detect than tradition malware attacks.
Articles by Darlene Storm