It's 2019. And yet faxing is still often more secure, easier to use and better suited to existing work habits than computer-based messaging.
As curious social animals, humans are more trusting of people than we should be – especially when we're dealing with people over the phone, email or via SMS, in the absence of body language.
A number of factors – from our eagerness to place trust in people to our overconfidence in our own intelligence – make us easy prey.
To gain mastery over our inboxes we have to deal with the root causes and not just the symptoms that frequently flare up.
How data is changing the shape of our personal 'bubble' – in pictures.
Sarcasm thrives in ambiguous situations, which makes it especially ripe for misinterpretation.
From asking a partner to pick up dinner on the way home to checking in on a neighbor with health problems, we frequently face the question, 'What's the best way to communicate?'
What happens to your Facebook account, your iTunes purchases and your email messages when you die?
A flat management structure can reduce costs and boost efficiency but may be hard for larger firms to implement.
The things we think about email, rightly or wrongly, and what light scientific research has to shine on them.
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
Some of the iPhone's innovations have made users less secure.
It's impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It's time to return to plain, text-only email.
Do you reply to emails first thing in the morning and last thing at night? Your company should be insisting that you don't.
As a part of human interaction, emails are as nuanced and complex as the social world we find them, and it is unlikely that we can rely on a checklist of quick-fix rules.
Even if fake articles could be curbed and filtered news modified, there's something built into Facebook's anatomy that foments partisan rage.
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
Huma Abedin's emails belong to her; the search warrant should be served upon her. Once that happens, she can challenge the warrant's legality.
The FBI has a history of abusing search warrants to illegally read Americans' emails. Did the agency just do it again, in the highest of all high-profile situations?
We don't expect our own government to hack our email – but it's happening, in secret, and if current court cases go badly, we may never know how often.