|Monday, September 24, 2018
You are here: Home » Technology

Technology

Some people call it personality-based advertising, but others call it invasion of privacy. Do you know how is it that those pesky, targeted ads that follow you everywhere you go online actually work? We are … Full article

New law allows the United States to access data from companies and users located in the European Union. While in Europe parties focus on the entry into force of …

Public spaces are under constant surveillance. Hypervigilance is not so evident when we walk through the streets, but it exists: in addition to cameras, even the wastebaskets and telephone …

Facebook continues to defy all the limits of intrusion. It does not seem like an easy task to choose a filter for a “selfie”. The matter gets even more …

The former head of Operations of Facebook confesses he could not continue working there knowing what they were doing. Sandy Parakilas’ job was to monitor the privacy of Facebook …

Facebook admitted that they were performing psychological experiments on users. You may not be on social media yourself, but chances are your friends and family are. Some of us … Full article

Perhaps the single most successful lie told by authorities worldwide is that people must be under continuous surveillance to remain safe. This excuse comes second to none, not even convenience, …

Facebook wants and has more information from you than your friends’ list or your geolocation. The controversy that is revolving around Facebook does not stop, at least not completely. …

Some of the most disgraceful crimes in history continue to be perpetrated by out-of-control forces. Although spying on someone’s private conversations may not be classified as a crime against …

The key that opened to door for Facebook is apparently, dopamine. To get people to stay on Facebook for a long time, you have to generate dopamine discharges. These …

Internet crime, cyberwar and cyberespionage are some of the most popular terms in the tech world. The boogeyman of the 20th century was so-called Islamic Terrorism. In the 21st century, …

Facebook excuses its censorship on a plea to “end disinformation” and “sensationalism” on the internet. It will not be enough to have a large audience or be registered as …

SÃO PAULO – Facial recognition technology comes loaded with comfort, yes, promises of greater security, okay. But it also comes loaded with a major, yet often ignored inconvenience: Violation …

Social media personalities generated more than $4 billion in one year for large social media pyramid scam users. A pyramid scheme or as I prefer to call it, pyramid …

La conectividad y los avances tecnológicos no tienen que ser arriesgados. Está en las manos de los consumidores el exigir que su privacidad y seguridad sean protegidas. Imagine un …

A previous article explained Google’s transformation from search engine to online censor. Changes in its search algorithm makes it harder to access what it calls fake news, low-quality information …

So…some people actually want to be microchipped like a dog. They’re lining up for it. They’re having parties to get it done. It if isn’t available to them, they’re …

In case you don’t have enough to worry about with hackers getting into our power grids, cyber attacks taking down entire countries, and epic natural disasters, a newly discovered …

Were Hurricanes Harvey and Irma natural or engineered? It’s unclear. Geoengineering makes the latter possible. So-called High Frequency Active Auroral Research Program (HAARP technology) manipulates the atmosphere, climate, and …

We’ve all seen it before. Magic vaccines that prevent disease, magic pharmaceuticals that promise to treat and cure those who are ill, magic diet pills that will make you …

Sometimes you have to think that scientists don’t ever read science fiction, and thus have not even contemplated all the things that could go wrong when they do something …

Facebook, Google and Twitter use the name Net Neutrality to push for a tighter, more monopolised Internet while claiming they seek  to protect an open environment. Dozens of technology …

The Petya Ransomware attack hit globally, but one country, in particular, was devastated by it. The Ukrainian infrastructure was brought own by the attack, where the epicenter occurred, and now, …

Remember that Eternal Blue loophole created by the NSA? Well, it has been employed again in the launch of the Petya Ransomware Cyberattack. Thanks, NSA. The attack began earlier …

It is becoming more common for parents to share pictures of their children – sharenting – since they are babies. Many do it innocently but experts warn of future …