Amazon’s Ring says its connected-doorbell devices are building “safer neighborhoods.” Follow these steps to better protect the data (and video) they collect from hackers and partners.
LAS VEGAS—Are you too sexy for your license plate? Hacker and fashion designer Kate Rose thinks not. Until now, most antisurveillance fashion has surrounded... Read More...
Before booking a stay, read the home description for a required camera disclosure. And after checking in, you can take these steps to find a hidden camera and protect your privacy.
Two leaders of the Human Rights Foundation-backed initiative Flash Drives for Freedom detail why—and how—they flood North Korean markets with entertainment-loaded USB sticks.
Amid global struggles to balance travelers’ privacy with strong border protections, a New Zealand Customs Service representative explains recent updates to its device search policies.
Following the massacre from the Mandalay Bay, hotel security personnel began routinely checking rooms. They’re now clashing with privacy advocates attending security conferences.
Even if your boss isn't actively surveilling you—or you think you have nothing to hide—you should know how blurring the line between personal and professional puts your privacy at risk.
When researchers inspected the ingredients of SiliVaccine, North Korea-developed Windows antivirus software, they found a mix of spyware and old stolen Trend Micro code.
Some privacy advocates say it calls for a resurrected debate over FISA practices. But Nunes himself is a steadfast surveillance supporter of the existing process.
Researchers say the nation-state developers behind the Android spyware campaign Dark Caracal took a page from developers of legitimate software, relying on recycled components.
Beyond the big three credit-reporting bureaus, a universe of secret companies can make or break your ability to get a job, insurance, home, or even a seat at a poker table. Take note.
As some lawmakers push for the extension of FISA Section 702, an expiring law that allows programs like Prism and Upstream, others push for new privacy protections.
Privacy and online-rights advocates say Spain’s recent heavy-handed Internet control is unprecedented for a Western democracy—and it could return with this week’s snap election.
Government agencies—and the individuals who work for them—often trust the deep-scanning skills of security software like Kaspersky’s to keep their computer files safe.
Granick, the director of civil liberties at Stanford Law School and recent author of “American Spies,” sounds off on the nature, effectiveness, and justness of U.S. surveillance today.
Trump's DHS proposal to demand travelers’ social-media account passwords before entering the U.S. worries legal and computer security experts.
What was once an obscure app offering protection for which most people couldn’t contemplate a use is being rapidly adopted by tech titans and rebels alike. Here’s why.
Tools developed to create, acquire, and distribute data can also be used to gain influence, monitor, and persecute. These uses are two sides of the same coin.
Responding to a court order, Yahoo reportedly made custom software to scan billions of emails for terrorist ties. Beyond constitutionality, the legality of compulsory tool development remains an open question.
To any software engineer with an imagination, the resulting possibilities are horrifying. A favorable precedent would let the government turn us into unwilling surveillance assistants.
Chess grandmaster Garry Kasparov takes a break from opposing Vladimir Putin’s policies to talk with The Parallax about human rights, government spying, and privacy tools.
Privacy advocates split on how to proceed, after the controversial cybersecurity law gets tacked on to a massive government spending bill.
Some lawmakers want social-media providers, ISPs, and other businesses to report suspected terrorist activity, but critics say additional requirements may be counterproductive.
The documentary, of two filmmakers who traveled to Tibet before the 2008 Olympics, shows how China uses technology to control information and people far beyond its borders.
As the technological capabilities of unmanned aerial vehicles proliferate, privacy groups are pushing for laws to require police to obtain warrants to use them.
While several tech titans require warrants to give police and prosecutors access to customers’ older stored communications, countless Internet companies with fewer legal resources likely are complying with agency-issued subpoenas.
The political establishment and the tech industry aren’t clashing for the first or last time over the government’s proper role in safeguarding privacy and cybersecurity.
A proposed law to make it easier for government agencies to share information also would allow businesses to deliver personal data to the NSA or FBI, critics contend.