We have never been so connected and we are producing more data than ever before. But how can we manage our data effectively while making sure it remains safe?
New standards and regulations are beginning to govern how companies protect customers' data. Companies ignore this vital issue at their peril, both financially and legally.
Tor’s improvements can help users stay private and anonymous online.
Anonymous online via shutterstock.com
The Tor Project is upgrading its protections for internet users' privacy and anonymity. A scholar and volunteer member of the nonprofit effort explains what's changing and why.
How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
What if even you didn’t know your own password?
Password via shutterstock.com
As searches of smartphones and other digital devices at US borders become more common, can research and computer science help protect travelers' privacy?
The darknet, like the open internet, is not immune from illegal activity. But many darknet users are there in search of 'hacker ethics' values such as privacy and free speech.
If only it were this easy.
'Keyboard' via shutterstock.com
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.
An Internet of the future, where every network connection could be secure.
Padlock network via shutterstock.com