A new type of video surveillance protects the privacy of individuals.
Podcaster Jennifer Chu covers the debate over content control from the Emerging Technologies Conference at MIT.
Princeton U. researchers have released a study and video that demonstrate the ease of altering votes on an electronic voting machine.
New research shows that making drivers pay higher tolls at peak times and tracking their location with RFID or GPS technology can eliminate traffic jams.
Prototype software from Google Research could listen to your TV and send back useful information – and ads of course.
Unsolicited e-mail that touts penny stocks is on the rise and getting results.
As terrorism worries grow, will Congress finally force chemical plants to consider security upgrades? Don’t bet on it.
New software could block voice spam.
A new lottery-style scratch card has been developed that might make elections less susceptible to rigging.
New Web-based services don’t just store your data online – they keep it synchronized across your laptop, desktop, and mobile phone.
A website provides image-processing software for sorting through online photo albums. But does it raise a privacy concern?
Computer security guru Bruce Schneier says media companies won’t ease up on invasive technology until consumers balk.
When Sony BMG hid a “rootkit” on their CDs, they spied on you and let hackers into your computer. What were they thinking?
Technology behind the Pentagon’s controversial data-mining project has been acquired by NSA, and is probably in use.
What will IBM’s new hardware-based security technology be used for?
Invasive technologies continue to emerge as companies’ scour for consumer information. Who is tracking your Internet use? Do you have total control over your Web-based e-mail account? What is a rootkit, and what do you need to know about it?
What would happen if genetic and medical records were freely available to anyone who wanted them?
The National Security Agency’s “CryptoKids” website uses cartoon characters to recruit future codemakers and codebreakers.
Incompatibilities among “copyleft” licenses meant to promote the sharing of creative work could end up preventing it, says cyber-law expert Lawrence Lessig.
Internet users should think carefully before relying on Gmail.
After MGM v. Grokster, are we any closer to a solution?
Mikko Hypponen defends the Web against mischief.
Do we want music, software, and books to be free – or not?
Contrary to what Lawrence Lessig says, a truly free society allows for proprietary systems.
Today’s password schemes are unworkable and offer little security for users.
Fraud, gruesome propaganda, terror planning: the Net enables it all. The online industry can help fix it.
Anil Jain at Michigan State University seeks to improve security by integrating various types of biometrics.