96 Results for

identity-based networking

Article

Homeland Security busts child porn ring on Tor network

An underground Web site, with more than 27,000 members and hosting more than 2,000 explicit videos of minors, is shuttered with 14 of its alleged operators arrested.

By March 18, 2014

Article

A superhero Sabbath? Comic-Con to host cosplay Shabbat

Where else but Comic-Con would you find Sonic Screwdrivers at a Sabbath table? A Shabbat "un-networking event" that got its start at SXSW comes to the massive geek-fest.

By July 21, 2014

Article

ARM tries to spread its chips to forests, fields, and factories (Q&A)

Gary Atkinson's job is to make sure the Internet of Things becomes the next big thing for chip designer ARM.

By July 4, 2014

Article

Foursquare's head of product checks out of company

After four years, Alex Rainert is saying goodbye to the place-based social network he helped conceive.

By November 13, 2013

Article

Enhance privacy by being deliberately inaccurate

Devise a fake you that is close enough to the real you for friends to recognize, but that doesn't disclose personal information to strangers.

By October 10, 2013

Article

Blind spot: How a hoax about eye licking went global

Media finds weird news impossible to resist, even when it sounds too silly to be true. But it can fool people especially easily when coming from a place like Japan, birthplace of wacky trends.

By August 8, 2013

Article

Ask.fm, the troubling secret playground of tweens and teens

Insanely popular with kids, the question-and-answer service thrives on anonymity, making it fun and dangerous.

By June 8, 2013

Article

What is the NSA's PRISM program? (FAQ)

We now know that the NSA uses something called PRISM to monitor private Web data. Sounds like "1984." What does it really mean?

By June 7, 2013

Article

Zendesk hack snares user data from Twitter, Tumblr, Pinterest

Some information for users of the social networks was captured when hackers attacked the customer support service.

By February 21, 2013

Article

How to enable two-factor authentication on popular sites

It may not be the perfect security solution, but two-factor authentication reduces the risks associated with common Web activities -- from searching to social networking to online banking.

By January 29, 2013