Don't-Miss Privacy Stories
A former Microsoft privacy adviser says he was unaware that Microsoft assisted the National Security Agency.
After dodging the cops in Belize and succumbing to the heat in Guatemala, eccentric millionaire is spitting in the eye of another authority with D-Central, a device intended to circumvent NSA drag-nets.
Employees of the U.S. National Security Agency spied on "unfaithful" husbands, boyfriends and girlfriends using surveillance technology of the agency, according to a letter from the NSA to a U.S. Senator.
A bipartisan group of four U.S. lawmakers has introduced legislation that will prohibit bulk collection of phone records of Americans.
A California law enacted Monday gives California minors the right to ask a Web site to remove whatever content they choose, and restricts those sites from advertising certain items to minors.
The humorist-turned-politician sent an open letter to Apple CEO Tim Cook with a dozen questions on the privacy implications of Touch ID.
A court has decided that the First Amendment covers the Facebook pages that you give thumbs up to.
What does Acxiom know about you? More than you think, not all of it true, but AboutTheData.com lets you peel back the cover of the data mining giant and look inside.
Social media law evolves with a recent federal court ruling that recognizes some Facebook data can stay private under the Stored Communications Act.
Google and Microsoft already have filed such motions, saying they can't allay users' concerns about privacy without evidence.
Reports -- relying on documents provided by former NSA contractor Edward Snowden -- show that many tech companies are collaborating with the spy agencies to “destroy privacy,” says cryptographer and security specialist Bruce Schneier.
For nearly 7,000 of the more-than-12,000 U.S. requests during the first half of 2013, only non-content data was disclosed. However, more than 4,500 requests during that period resulted in the disclosure of actual user content by Yahoo.
New reports suggest the NSA is capable of cracking many of the encryption protocols being used today. Here are tools that minimize that risk.