What teenagers need to know about cybersecurity

Now that school is back in session, many high schoolers have new phones, new computers and new privileges for using their devices – and new responsibilities too. High schoolers today are more technology-savvy than average ...

Oversharing can have consequences, research says

Social media and digital communication tools make sharing private information easier than ever, but communication research suggests that people often fail to set clear expectations and boundaries when they share private information ...

The challenge of authenticating real humans in a digital world

Proving identity is a routine part of modern daily life. Many people must show a driver's license to buy alcohol at a store, flash an ID card to security guards at work, enter passwords and passcodes to retrieve email and ...

Protecting driver privacy in the connected age

Ben-Gurion University of the Negev (BGU) researchers have demonstrated that is possible to compromise a driver's private information stored in the cloud for Usage-Based Insurance (UBI) programs based on only part of the data ...

Banks hold major information advantage over other investors

Maybe Gordon Gekko was right when he said that information was the most valuable commodity of all. A new study showing major investment advantages for banks in countries where public economic data is scarce seems to support ...

page 4 from 8