By Valdis Krebs | Who is mining, mapping and measuring the tracks you leave behind on the Internet.

The End of the Internet Dream

In 20 years, the Web might complete its shift from liberator to oppressor. It’s up to us to prevent that.

Earlier this month Jennifer Granick was the

US Freedom Act a ‘surveillance act in disguise' - ex-MI5 agent

The recently passed USA Freedom Act was hailed as a stepping stone on the way to renewed public trust after the highly controversial Section 215 of …


How Google Could Rig the 2016 Election

Google has the ability to drive millions of votes to a candidate with no one the wiser.

America’s next president could be eased into office not just by TV ads or speeches, but by Google’s secret decisions, and no one—except for me and perhaps a few other obscure researchers—would know how this was …


The Most Common Mistakes These 27 Cyber Security Experts Wish You’d Stop Doing

In spite of all the media attention that cyber attacks have been getting lately, cyber security is still not as important of an issue for Internet …


Ivory smuggling route tracked via fake tusks with GPS

National Geographic reporter Bryan Christy commissioned two fake elephant tusks embedded with GPS, then planted them to track ivory smuggling routes from the Central African Republic into Sudan.

As with blood diamonds, the ivory is used by armed groups like Joseph Kony's Lord's Resistance Army to …

GPS Tracking

How parties ask for your vote but help themselves to your data

If you’re a Canadian voter exercising your freedom to assess your options among the parties or declare your support online, every visit you make to a …


Why big data should not be considered inconsistent with privacy

Big Data

These hackers warned the Internet would become a security disaster. Nobody listened. | The Washington Post

Published on June 22, 2015

The seven young men sitting before some of Capitol Hill’s most powerful lawmakers weren’t graduate students or junior analysts from some think tank. No, Space Rogue, Kingpin, Mudge and the others were hackers who had come from the mysterious environs of cyberspace to …


Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth

Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to

I Spoke Up Against Sexist Remarks On Facebook; What Followed Was Worse

I am a strong independent woman who has been fortunate to have a privileged upbringing. One would assume, I live a more secure life. Yet, I have …

10 Mind-Reading Tech Projects That Might Freak You Out

Our gadgets know where we are and what we've been doing. But our thoughts are safe. Right?

Technology that reads your mind seems like a dream. Or a …

Six easy ways to ensure your cyber security

Anyone with a computer has probably been a victim of a phishing attempt, where hackers pose as a trustworthy entity and try to get your username, …