Google recently published a patent to use facial recognition and social networking combined to give visual search results.
Does a code of ethics still exist in Intelligence firms? Does it disappear behind closed doors, dirty deeds done in the dark and used against the American people who are supposed to be free to express themselves?
Millions of passwords have been breached and when information that is supposed to be private becomes public, it can open the way to identity theft.
Widgets are used by millions of legitimate websites to deliver content and advertising. But attackers are using widgets for evil intent and infection, warned a security researcher at Black Hat DC.
Analysis: Researchers identify a way to send toxic SMS messages that can infect and shut down even feature phones.
The EFF opposes new rules proposed by the Financial Crimes Enforcement Network that would pry into users' privacy if they send any money overseas electronically.
If you are not "authorized" personnel, but you have read, written about, commented upon, tweeted, spread links by "liking" on Facebook, shared by email, or otherwise discussed "classified" information disclosed from WikiLeaks, you could be implicated for crimes under the U.S. Espionage Act
The Office of Inspector General found "serious" security breaches at NASA centers after computers were sold with sensitive data still on them.
Articles by Darlene Storm