Amazon’s Ring says its connected-doorbell devices are building “safer neighborhoods.” Follow these steps to better protect the data (and video) they collect from hackers and partners.
LAS VEGAS—Are you too sexy for your license plate? Hacker and fashion designer Kate Rose thinks not.
Until now, most antisurveillance fashion has surrounded... Read More...
Before booking a stay, read the home description for a required camera disclosure. And after checking in, you can take these steps to find a hidden camera and protect your privacy.
Two leaders of the Human Rights Foundation-backed initiative Flash Drives for Freedom detail why—and how—they flood North Korean markets with entertainment-loaded USB sticks.
Amid global struggles to balance travelers’ privacy with strong border protections, a New Zealand Customs Service representative explains recent updates to its device search policies.
Cluttered EHRs are reducing doctors’ ability to make good decisions for their patients while decreasing patient privacy, argues Twila Brase, author of Big Brother in the Exam Room.
Following the massacre from the Mandalay Bay, hotel security personnel began routinely checking rooms. They’re now clashing with privacy advocates attending security conferences.
Even if your boss isn't actively surveilling you—or you think you have nothing to hide—you should know how blurring the line between personal and professional puts your privacy at risk.
As advanced surveillance technologies become more and more accessible, companies and individuals will more readily use it to track others, developer Emily Crose argues.
When researchers inspected the ingredients of SiliVaccine, North Korea-developed Windows antivirus software, they found a mix of spyware and old stolen Trend Micro code.
Some privacy advocates say it calls for a resurrected debate over FISA practices. But Nunes himself is a steadfast surveillance supporter of the existing process.
Researchers say the nation-state developers behind the Android spyware campaign Dark Caracal took a page from developers of legitimate software, relying on recycled components.
Beyond the big three credit-reporting bureaus, a universe of secret companies can make or break your ability to get a job, insurance, home, or even a seat at a poker table. Take note.
As some lawmakers push for the extension of FISA Section 702, an expiring law that allows programs like Prism and Upstream, others push for new privacy protections.
Privacy and online-rights advocates say Spain’s recent heavy-handed Internet control is unprecedented for a Western democracy—and it could return with this week’s snap election.
The USA Liberty Act, designed to revamp and reauthorize FISA Section 702, would still allow the FBI and other agencies to query the NSA database of U.S. communications sans warrant.
Government agencies—and the individuals who work for them—often trust the deep-scanning skills of security software like Kaspersky’s to keep their computer files safe.
Privacy advocates in Congress oppose reauthorization of FISA’s Section 702 without major reform. The implication: Existing surveillance programs won’t survive without new privacy protections.
Granick, the director of civil liberties at Stanford Law School and recent author of “American Spies,” sounds off on the nature, effectiveness, and justness of U.S. surveillance today.
What was once an obscure app offering protection for which most people couldn’t contemplate a use is being rapidly adopted by tech titans and rebels alike. Here’s why.
Tools developed to create, acquire, and distribute data can also be used to gain influence, monitor, and persecute. These uses are two sides of the same coin.
The ways private companies and government agencies use information created by and attached to all forms of digital communication are far-reaching and, in some cases, vital.
Responding to a court order, Yahoo reportedly made custom software to scan billions of emails for terrorist ties. Beyond constitutionality, the legality of compulsory tool development remains an open question.
The “notoriously inaccurate” tech has spread from government databases to popular apps. And although it’s improving (and spreading) constantly, it’s not ready for prime time, privacy advocates say.
To any software engineer with an imagination, the resulting possibilities are horrifying. A favorable precedent would let the government turn us into unwilling surveillance assistants.
Chess grandmaster Garry Kasparov takes a break from opposing Vladimir Putin’s policies to talk with The Parallax about human rights, government spying, and privacy tools.
Law enforcement wants access to encrypted communications. Creating so-called backdoors could bring with it unintended consequences, including threats to personal privacy.
Hardly a modern invention, encryption has been in use for almost 4,000 years. Take a brief journey through history as we highlight some of the seminal moments in the development of coded communications.
Some lawmakers want social-media providers, ISPs, and other businesses to report suspected terrorist activity, but critics say additional requirements may be counterproductive.
The USA Freedom Act may have hampered the agency’s program for bulk collection of U.S. phone records, but “there are a lot of unknowns” about how it might be interpreted or sidestepped.
The documentary, of two filmmakers who traveled to Tibet before the 2008 Olympics, shows how China uses technology to control information and people far beyond its borders.
In the wake of the terrorist attacks in France, U.S. government agencies, including the CIA, are reiterating their arguments for security standard backdoors into communications data.
As the technological capabilities of unmanned aerial vehicles proliferate, privacy groups are pushing for laws to require police to obtain warrants to use them.
While several tech titans require warrants to give police and prosecutors access to customers’ older stored communications, countless Internet companies with fewer legal resources likely are complying with agency-issued subpoenas.
Illinois ruling addresses several of privacy advocates’ issues with law enforcement agencies’ use of secretive “stingray” tracking technology to collect cell phone data.
The political establishment and the tech industry aren’t clashing for the first or last time over the government’s proper role in safeguarding privacy and cybersecurity.
Opponents of the cyberthreat information-sharing bill, designed to protect companies that share cyberattack data with federal agencies from customer lawsuits, face tough odds.
A proposed law to make it easier for government agencies to share information also would allow businesses to deliver personal data to the NSA or FBI, critics contend.