|Saturday, February 16, 2019
You are here: Home » Technology

Technology

Risks would multiply in line with the multiplication of the number of devices and their ease in hacking them. The latest generation of mobile communications is allowing us to access multimedia content or interact with … Full article

Low productivity is not the result of poor organization. Today, we have a huge amount of tools and systems that help us measure, manage and maximize our performance. The …

Although I know that powerful social media platforms are out to block and ban people who say things they do not like, being blocked myself has a different taste …

What reasons lead you to think that someone may be spying on you? You are not a TV personality or lingerie top model. Unfortunately, data management and violations of …

We all know what large technology companies do with people’s data: They use it to their advantage, they sell it to the highest bidder, they use to spy on …

Data management has become a social debate; unnecessarily so. Data belongs to users and that should be obvious. Companies should get it, governments should get it. No one should … Full article

Have you ever heard the term ‘smart borders’? Probably not, until now; and it is about time you know what it is and what it is being used for. …

It seems that the use of Facebook by teenagers decreases faster among rich teenagers in the US. For years, the size and influence of Facebook increased at an amazing …

Almost one third of humanity has an account on the social network that is more popular than any existing religion. There are a few things that are shared by …

Fingerprinting and face recognition technology will allow for surveillance in a hyperconnected slave grid. It is called by many, “affective computing” or the ability to easily and instantly recognize …

Some people call it personality-based advertising, but others call it invasion of privacy. Do you know how is it that those pesky, targeted ads that follow you everywhere you …

New law allows the United States to access data from companies and users located in the European Union. While in Europe parties focus on the entry into force of …

Public spaces are under constant surveillance. Hypervigilance is not so evident when we walk through the streets, but it exists: in addition to cameras, even the wastebaskets and telephone …

Facebook continues to defy all the limits of intrusion. It does not seem like an easy task to choose a filter for a “selfie”. The matter gets even more …

The former head of Operations of Facebook confesses he could not continue working there knowing what they were doing. Sandy Parakilas’ job was to monitor the privacy of Facebook …

Facebook admitted that they were performing psychological experiments on users. You may not be on social media yourself, but chances are your friends and family are. Some of us …

Perhaps the single most successful lie told by authorities worldwide is that people must be under continuous surveillance to remain safe. This excuse comes second to none, not even convenience, …

Facebook wants and has more information from you than your friends’ list or your geolocation. The controversy that is revolving around Facebook does not stop, at least not completely. …

Some of the most disgraceful crimes in history continue to be perpetrated by out-of-control forces. Although spying on someone’s private conversations may not be classified as a crime against …

The key that opened to door for Facebook is apparently, dopamine. To get people to stay on Facebook for a long time, you have to generate dopamine discharges. These …

Internet crime, cyberwar and cyberespionage are some of the most popular terms in the tech world. The boogeyman of the 20th century was so-called Islamic Terrorism. In the 21st century, …

Facebook excuses its censorship on a plea to “end disinformation” and “sensationalism” on the internet. It will not be enough to have a large audience or be registered as …

SÃO PAULO – Facial recognition technology comes loaded with comfort, yes, promises of greater security, okay. But it also comes loaded with a major, yet often ignored inconvenience: Violation …

Social media personalities generated more than $4 billion in one year for large social media pyramid scam users. A pyramid scheme or as I prefer to call it, pyramid …

La conectividad y los avances tecnológicos no tienen que ser arriesgados. Está en las manos de los consumidores el exigir que su privacidad y seguridad sean protegidas. Imagine un …