The Secret Social Media Lives of Teenagers
Private groups - like the one used by students whose Harvard acceptances were recently rescinded - may offer a false sense of confidence.
Private groups - like the one used by students whose Harvard acceptances were recently rescinded - may offer a false sense of confidence.
Author Jean M. Twenge examines how smartphone and tablet access has impacted the "iGen" (those who grew up around these technologies), including its impact on loneliness, depression, sleep, and other aspects.
Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials.
In science-fiction author Cory Doctorow's short story "Scroogled," a woman shrugs when she sees "Immigration--Powered by Google" on an airport sign, but that's just the beginning of the search giant's presence in a not-too-distant future.
A computer science graduate student exposes that 87 percent of all Americans could be uniquely identified using only three bits of information, highlighting that almost all information can be "personal" when combined with enough other relevant bits of data.
The European Court of Justice, in a broadly worded directive, stated that all individuals in the countries within its jurisdiction had the right to prohibit Google from linking to items that were “inadequate, irrelevant or no longer relevant, or excessive in relation to the p
A series of costly delays and crucial errors caused Equifax to remain unprotected for months against one of the most severe Web application vulnerabilities in years, the former CEO for the credit reporting service said in written testimony investigating the massive breach that
SamSam Ransomware group targets hospitals, a city council group, and an industrial control system firm in the beginning of 2018. The article provides brief details on the scam.
A report says that the automotive industry has experienced 94% year-over-year growth in hacks since 2016. White hat hackers/bug bounties have accounted for 38% of these hacks, but majority are from black hat hackers.