Consent has been a fundamental ideal of human relationships throughout history.
"It transforms the specific relations between the consenter and consentee abo... Read More »
Cyberbullying, pornography, sexting, Internet addiction—teens can stumble into serious digital trouble, and it's got parents worried.
But many popular safety... Read More »
Those lost at sea or caught in hostage situations would welcome a team of drones to find them.
However, if those persons were sunbathing in their backyard—pe... Read More »
The key driving force behind any capture-the-flag competition is the scoring algorithm; the Cyber Grand Challenge (CGC) was no different.
The scoring algorit... Read More »
Today’s companies collect immense amounts of personal data and enable wide access to it within the company. This exposes the data to external hackers and privac... Read More »
International cybercrime has now become so extensive, underground suppliers are cropping up on the dark web offering easy access to the tools, programming frame... Read More »
In the article “Botnet Fingerprinting: Anomaly Detection in SMTP Conversations,” which appears in the November/December 2017 issue of IEEE Security & Privac... Read More »
By Michael Martinez and Lori Cameron
Worried about your online security? A Google team asked experts on its Google Online Security Blog for their top three p... Read More »
Intimate partner abuse can be a harrowing, life-threatening experience for victims. Unfortunately, current tech advances seem more often to aid the abuser in co... Read More »
E-commerce, smartphones, and social networks provide numerous benefits but require users to disclose personal information and, in some cases, behavior patterns ... Read More »