Worries about big data and privacy are all over the news, but our new research shows that big data can also help better understand users' privacy concerns.
This is the story of how — and why — Google switched to numeric captchas. Captchas are these wiggly words used as a puzzle to tell humans apart from computers. Over the last few years, based on my work that began at Stanford, I’ve been working on designing a more user-friendly captcha for Google that […]
Half of Android users don’t bother to lock their phones, despite having the choice of using patterns, passwords, PINs, and even their faces to secure their devices. This contrasts starkly with a report from the Federal Communications Commission warning that up to 40 percent of robberies in major cities involve cell phones. More precisely, over 52 percent […]
Marketers agree: screen size is a top priority for anyone shopping for their next cell phone but my new consumer survey challenges this conventional wisdom.
Social tags are the HTML tags that social networks use to know what to display when one of their users shares your webpage. Because these tags determine how your page is presented in users’ social network feeds, optimizing those tags is an essential part of modern SEO. In this post we’ll look at Facebook and […]
I was lucky enough to get the new 2013 high-end Macbook Pro Retina (15″) yesterday and started wondering about how it compares to the mid-2012 Retina (15″) model. On a personal level, I’m also pretty interested in how its gaming performance compares with its predecessor’s.
Nearly everyone loves mobile apps that can perform local searches, get directions, or find the nearest decent restaurant. But what’s not so obvious is that these local apps can have hidden bandwidth costs — meaning that, in some cases, they can run up your phone bill in ways you might not expect.
Outsourcing blog comments to cloud services such as Disqus or Livefyre offers plenty of advantages: spam protection, analytics, already signed users and deep integration with social networks such as Twitter and Facebook. Those features are appealing. But outsourcing your comments comes with a price: it will slow down your site. It’s been demonstrated time and […]
The next time you think you’re buying an iOS app from Apple’s online store, be warned: it could be a lookalike site. Recently I was redirected via an ad to an Apple-spoofing site at Badoink.
Early July 2012, I reported to Apple numerous vulnerabilities related to their App Store iOS app. Last week Apple finally issued a fix for it and turned on HTTPS for the App Store. I am really happy that my spare-time work pushed Apple to finally enabled HTTPS to protect users. This post discuss the vulnerabilities […]