Cars now run on data. We hacked one to find out what it knows about you.
Snowden’s New App Turns Your Phone Into a Home Security System

Snowden’s New App Turns Your Phone Into a Home Security System

Snowden’s New App Turns Your Phone Into a Home Security System Your digital security, any sufficiently paranoid person will remind you, is only as good as your physical security. The worlds most sensitive users of technology, like dissidents, activists, or journalists in repressive regimes, have to fear not just hacking and online surveillance, but the

Rebuilding Trust in the Surveillance State

Rebuilding Trust in the Surveillance State

There’s always some power involved in the question of surveillance. There’s always power over others by some. So, there’s bound to be some tension in the notion of surveillance. From the twentieth century, we see state surveillance growing quite rapidly with the development of computer-based communications and computer-based storage and collection of data. 9/11 was

NICE Actimize Holistic Surveillance

NICE Actimize Holistic Surveillance

Imagine today’s trading landscape as a fast-paced ever-changing maze of regulations and requirements. In this environment, many traders will naturally try to use any opportunity to gain the upper hand. You and your fellow compliance officers must identify anomalies and prevent risky behavior, sifting through data from millions of transactions and communications per second across

Security capabilities on IBM Power Systems by Petra Bührer

Security capabilities on IBM Power Systems by Petra Bührer

In this short video I would like to talk a bit about our Security capabilities on Power in particular in terms of recent enhancements and new offerings. Our core and fundamental approach to security has been steady over all these years, and it has allowed us to navigate multiple eras of risks and threats and

Are Mobile Apps Secure? | NordVPN

Are Mobile Apps Secure? | NordVPN

Hey there, we use our mobile apps daily, but have you ever wondered about their potential threats? Here are the main ones to keep in mind.  1. Poor data encryption and insecure storage. An app may not use high-end encryption to ensure your privacy and protect your data. So, it could end up in the

Monitoring, Surveillance, Sousveillance

Monitoring, Surveillance, Sousveillance

Hi. I’ve been studying human-computer interaction for a long time. And more recently I’m turning my eye to human-data interaction. And when I say data, I mean all of the data about you as a consumer that is collected from devices and services. Or the data that you’re collecting as developers from people. If you

CDC – National Notifiable Diseases Surveillance System (NNDSS) Modernization Initiative

CDC – National Notifiable Diseases Surveillance System (NNDSS) Modernization Initiative

Hello, I’m Paula Yoon, director of the Division of Health Informatics and Surveillance at the Centers for Disease Control and Prevention. Our mission at CDC is to keep Americans safe and healthy where they work, live, and play. Our scientists and disease detectives work around the world, and around the clock, to track diseases and

Transparent Lives: Surveillance in Canada // Vivre à nu: La surveillance au Canada [Book Trailer]