|Saturday, August 18, 2018
You are here: Home » Technology

Technology

Public spaces are under constant surveillance. Hypervigilance is not so evident when we walk through the streets, but it exists: in addition to cameras, even the wastebaskets and telephone booths extract data to try to … Full article

Facebook continues to defy all the limits of intrusion. It does not seem like an easy task to choose a filter for a “selfie”. The matter gets even more …

The former head of Operations of Facebook confesses he could not continue working there knowing what they were doing. Sandy Parakilas’ job was to monitor the privacy of Facebook …

Facebook admitted that they were performing psychological experiments on users. You may not be on social media yourself, but chances are your friends and family are. Some of us …

Perhaps the single most successful lie told by authorities worldwide is that people must be under continuous surveillance to remain safe. This excuse comes second to none, not even convenience, …

Facebook wants and has more information from you than your friends’ list or your geolocation. The controversy that is revolving around Facebook does not stop, at least not completely. … Full article

Some of the most disgraceful crimes in history continue to be perpetrated by out-of-control forces. Although spying on someone’s private conversations may not be classified as a crime against …

The key that opened to door for Facebook is apparently, dopamine. To get people to stay on Facebook for a long time, you have to generate dopamine discharges. These …

Internet crime, cyberwar and cyberespionage are some of the most popular terms in the tech world. The boogeyman of the 20th century was so-called Islamic Terrorism. In the 21st century, …

Facebook excuses its censorship on a plea to “end disinformation” and “sensationalism” on the internet. It will not be enough to have a large audience or be registered as …

SÃO PAULO – Facial recognition technology comes loaded with comfort, yes, promises of greater security, okay. But it also comes loaded with a major, yet often ignored inconvenience: Violation …

Social media personalities generated more than $4 billion in one year for large social media pyramid scam users. A pyramid scheme or as I prefer to call it, pyramid …

La conectividad y los avances tecnológicos no tienen que ser arriesgados. Está en las manos de los consumidores el exigir que su privacidad y seguridad sean protegidas. Imagine un …

A previous article explained Google’s transformation from search engine to online censor. Changes in its search algorithm makes it harder to access what it calls fake news, low-quality information …

So…some people actually want to be microchipped like a dog. They’re lining up for it. They’re having parties to get it done. It if isn’t available to them, they’re …

In case you don’t have enough to worry about with hackers getting into our power grids, cyber attacks taking down entire countries, and epic natural disasters, a newly discovered …

Were Hurricanes Harvey and Irma natural or engineered? It’s unclear. Geoengineering makes the latter possible. So-called High Frequency Active Auroral Research Program (HAARP technology) manipulates the atmosphere, climate, and …

We’ve all seen it before. Magic vaccines that prevent disease, magic pharmaceuticals that promise to treat and cure those who are ill, magic diet pills that will make you …

Sometimes you have to think that scientists don’t ever read science fiction, and thus have not even contemplated all the things that could go wrong when they do something …

Facebook, Google and Twitter use the name Net Neutrality to push for a tighter, more monopolised Internet while claiming they seek  to protect an open environment. Dozens of technology …

The Petya Ransomware attack hit globally, but one country, in particular, was devastated by it. The Ukrainian infrastructure was brought own by the attack, where the epicenter occurred, and now, …

Remember that Eternal Blue loophole created by the NSA? Well, it has been employed again in the launch of the Petya Ransomware Cyberattack. Thanks, NSA. The attack began earlier …

It is becoming more common for parents to share pictures of their children – sharenting – since they are babies. Many do it innocently but experts warn of future …

The use of quantum computers could spell the end of privacy and security. Everything a computer does today is based on a series of zeros and ones. These two …

There is no such thing as cyber security. The only choice is more security or less security, as the recent hack of the National Security Agency demonstrates. Hackers stole …