Using a single site as your browser homepage seems so quaint. You probably have a long list of sites you check as soon as you get in front of a computer: Twitter, Facebook, Gmail, Pinterest, and the Yahoo Answers page for “Can I take my cat ice skati
Last month, we flew to China and met with several executives at some of the biggest Internet companies over there.
Target Corp said data from about 40 million credit and debit cards might have been stolen from shoppers at its stores during the first three weeks of the holiday season, in the second-largest card breach at a U.S. retailer. The data theft,
The Washington Post’s new owner, Jeff Bezos, is the founder and CEO of Amazon — which recently landed a $600 million contract with the CIA. But the Post’s articles about the CIA are not disclosing that the newspaper’s sole owner is the main
A common pastime among the Internet's seedy underbelly is spying on people through their webcams then using the pictures to harass and blackmail the victims. This kind of hacking went mainstream when Miss Teen USA Cassidy Wolf was
Facebook has said that it is within its terms of service to see what users are typing even when the status or comment is never posted on the social network.
Everyone's talking about the "Internet of Things," but what exactly does that mean for our future? In this thoughtful talk, economist Marco Annunziata looks at how technology is transforming the industrial sector, creating machines that can see, feel
I'm happily married. But if I wasn't and I wanted to spice up my life with a bout of infidelity, there are several dating websites designed with that in mind.
GCHQ, the British counterpart and facilitator to the NSA, has forced a privacy focused email service to shut down because it could not effectively spy on the encrypted emails people were sending. Web security firm CertiVox was shut down
One particular cookie called Google PREF, is almost ubiquitous in the online world, is of particular value to the NSA – acting as a digital homing beacon for agency operatives to target individual computers and implant spyware inside them
PrivateSky developers speak out after being issued national security warrant
The Hour of Code is simple. Just go to code.org and click the START button. Yes, it is really that simple. There are quite a few tutorials at several different levels and in several different programing languages.
Like the idea of technology that wraps around a body part, displays the time and connects to your smartphone? No, we aren't talking about a smartwatch, but the "Smarty Ring" which may offer an even more subtle way to stay connected.
Riccardo G.’s profile on CouchSurfing.com, the website that partners intrepid wanderers with willing hosts, notes that he lives in the “best neighborhood to go out and have drinks,” .....
Ron Burgundy interviews Peyton Manning for ESPN.
The man who called himself “Mo” had dark hair, a foreign accent and — if the pictures he e-mailed to federal investigators could be believed — an Iranian military uniform. When he made a series of threats to detonate bombs at universities and airport
Two guys on Reddit who were enraged when someone stole as much as $100 million in Bitcoins from "Sheep Marketplace," an illegal online drug sales web site, believe the thief has passed the cash through a Bitcoin wallet that at one point contained as
A computer security researcher has stumbled upon another huge file of stolen user names and passwords that was posted on the 'net for other hackers to enjoy.
The past several weeks have seen the emergence of several innovative and user friendly websites related to Bitcoin specifically, and crypto-currencies generally.
Up until today, no one knew for sure who was behind ViralNova, the home for sharable, clickable, viral content that takes stories circulating the news ...
Each social media platform has a unique identity based on who uses the network and how they're engaging on the site.
Four out of five people regularly stop breathing while typing emails, according to studies conducted by former Apple executive Linda Stone.
Computer scientists have discovered a way to number-crunch an individual’s own preferences to recommend content from others with opposing views. The goal? To burst the “filter bubble” that surrounds us with people we like and content that we agree wi
The CEO of Box is building an online file storage system designed to reshape industries.
Snooping on private messages 'breach of the 4th Amendment'
Following NSA surveillance revelations, talks advance on making the privacy-protecting tool Tor an Internet standard.
None of the targets were accused of being involved in terror plots, except against a sweaty palm and a clean keyboard.
It's big business. But simmering cybersecurity tensions between China and the US could spell trouble for the industry.
People knowledgeable about Google and Yahoo’s infrastructure say they believe that government spies bypassed the big Internet companies and hit them at a weak spot — the fiber-optic cables that connect data centers around the world and are owned by c
With an increased focus on privacy thanks to revelations of massive spying by the NSA, computer users are (or should be) increasingly concerned about their security online.