LG's KizON wristband lets you keep tabs on your child. But some experts say such devices send the wrong message about the world we live in. And the gadgets raise questions about kids' privacy rights.
Privacy & Security
Cloud computing and mobile apps have put the power of the Internet everywhere from our laptops to our pockets, but they also continue to raise concerns about privacy, the security of our personal information and even national security. We explore the ongoing conflicts between convenience and safety.
Brian Krebs, who broke the Target security breach story last year, says cybercriminals are "some very bad people." He tells Terry Gross about how they have found creative ways to taunt him.
"Bad" Web bots are going after everyone they can, but why? Because by hijacking Grandma's computer, they make it look as if she visits a site often, thus making the site more valuable to advertisers.
Pew surveyed more than 1,400 tech industry leaders and academics to find a troubling consensus: By 2025, the Internet will be more balkanized, more surveilled and less open.
Security software that's meant to prevent data loss in firms is shifting the focus to employee behavior, monitoring activity round-the-clock in search of bad intent. But will bosses go too far?
In this week's roundup, a federal court says warrantless cellphone tracking is unconstitutional and we look back on a weeklong series exploring just how much of our digital data is exposed.
Unsecure Wi-Fi networks have been a well-known vulnerability in the tech industry for years. They can let even an unsophisticated hacker capture your traffic and possibly steal your identity.
It will start drawing on Web browsing data to determine what ads users see, while allowing them to edit their own data profiles. Privacy advocates say the changes put too much burden on consumers.
We looked at 15 top companies and services that handle your email or store your data every day to see what steps they take to keep it from prying eyes. See how they stack up.
NPR's Steve Henn, along with two tech experts, allowed Internet traffic through his laptop and cellphone to be monitored. If someone tapped your Internet connection, what would he find out?