- Welcome Guest
- Sign In
Two weeks ago, Republican vice presidential nominee Sarah Palin discovered that a hacker had gained access to her personal e-mail account and posted some of its contents -- both letters and photos -- on a Web site viewable by the public. The incident underscores the importance for anyone with secure...
Alaska Governor and vice presidential candidate Sarah Palin received a harsh lesson in the relative security, or rather lack thereof, of commercial e-mail accounts Wednesday. The GOP hopeful for VP discovered her personal Yahoo e-mail account, on which she allegedly conducted official state business...
For those social networking phenoms posting their every thought, drunken photo, tale of debauchery, and brush with the law on your MySpace, Facebook, and Twitter pages, a word of warning: You might want to tone yourself down if you're looking for a job. There's a 20 percent chance that your next emp...
Google's newly released Chrome browser is facing a backlash over its data collection and privacy practices. The company has already revised its end user license agreement following widespread concerns. Now, new worries are being raised about the browser's all-purpose Omnibox and how closely Google m...
A trio of French journalists from Global Security Magazine were reportedly kicked out of the Black Hat security conference in Las Vegas for targeting fellow reporters in the press room with a WiFi hack. The offending journalists/hackers may have used a network-sniffing tool called "Cain" to capture ...
It's been an interesting week. As if to prove the point of last week's column, Steve Jobs used his impressive skills to trick a New York Times reporter he didn't like into giving him a clean bill of health. This was brilliantly done, and there are some real lessons here that dovetail with last week'...
Facebook's new look is all about the Wall, the blank space on a profile page that the social network's users can fill in with stories, photos, links and the ever-popular Status Updates. In turn, Facebook executives hope a less-cluttered Web site will eventually fill in their bank accounts with more ...
It's no secret that individual privacy has already suffered since the Internet era began, but privacy law expert Daniel Solove believes things are likely to get even worse -- much worse -- and he illustrates his vision in living color with a wealth of examples from the here and now. In The Future of...
So, you've got an online image control crisis. Now what? In response to the growing threat of online image crises, businesses have sprung up that address exactly that problem. They work to repair your online image using a variety of tactics, including putting more positive information out there to s...
Our reputation is one of our most valuable possessions, determining in large part where we work, how much money we make, whom we date or marry, and many other aspects of our lives. The Internet, however, has made protecting, maintaining and defending our reputations difficult. Photos from college pa...
If you use Google's Gmail and like to access your account from several locations -- work, office, your smartphone, Internet cafes, etc. -- you can now remotely check the status of that account from all your log-in locations. Google announced a new remote signout and monitoring feature designed to en...
IT consultant Amir Khan, a U.S. citizen, has been subjected to U.S. Customs questioning for a total of more than 20 hours after returning from a number of trips abroad. Customs officials have searched Khan's laptop computer, books, personal notebooks and cell phone. He has never received an explanat...
High-profile data breaches continue to spotlight the growing risks consumers face of identity theft and credit card fraud. Four highly visible data breaches disclosed in the last 18 months are particularly worrisome because they show a systemic failure in the procedures that both the public and regu...
A team of scientists recently conducted a study of human travel patterns by secretly tracking the whereabouts of cell phone users. Aiming to investigate the geographical patterns in which humans travel over time, the researchers studied the trajectory of 100,000 anonymized cell phone users -- random...
Google launched the beta version of its Google Health personal health records aggregator Monday. The service, according to Google, will put users in control of their own medical records, giving them 24-hour-a-day access to their health records from a variety of sources. With the introduction of Goog...