Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation systems.
As my colleague Glenn Greenwald told WNYC on Monday, while there may never be conclusive evidence that the Democratic National Committee was hacked by Russian intelligence operatives to extract the trove of embarrassing emails published by WikiLeaks,
As Technocrats collect data on the aggregate of society, hackers are busy stealing the data for their own uses. However, this is much like a small leak in a water pipe. Technocrat controllers are not too concerned as long as they control the whole da
In the aftermath of the fallout from the DNC server hack, the Democrats have been scrambling how to redirect public anger (especially among Bernie Sanders supporters) from the revelations that not only did the Democratic party try everything in its p
As the threat of Technocracy increases, creative technology will emerge to oppose it. In this case Snowden and Huang are proposing a phone case that will alert you to unauthorized transmissions to hackers and spy agencies. ? TN Editor
A confidential database of suspected or convicted criminals and terrorists has surfaced on a dark web marketplace just a few weeks after a security researcher revealed that the database was left exposed online.
Ethereum, a virtual currency and coding platform, passed one of the most important and potentially dangerous milestones for any piece of software on Wednesday: A hard fork in its code that effectively created two different versions of the currency.
Leading up to Coup Announced. WikiLeaks reported suffering a "sustained attack" after it announced the upcoming release of hundreds of thousands of documents relating to Turkish leader Recep Tayyip Erdogan's Justice and Development Party (AKP)
A sophisticated piece of government-made malware, designed to do reconnaissance on energy grid's system ahead of an eventual cyberattack on critical infrastructure, was found on a dark web hacking forum.
Do you have any idea what the software you have installed is doing stealthily in the background? If it's not an open source software, can you find out?
Do you have any idea what the software you have installed is doing stealthily in the background? If it's not an open source software, can you find out?
For anyone who cares about Internet security and encryption, the advent of practical quantum computing looms like the Y2K bug in the 1990s, a countdown to an unpredictable event that might just break everything.
On a giant flat-screen TV in an old Emeryville, California warehouse, a floating orb fires red, blue, pink, and yellow beams into a honeycomb of hexagonal blocks. The blocks are black, white, and gray, but as the beams hit them, they change--flashin
A researcher has obtained a copy of Thomson Reuters' "World-Check" confidential intelligence database, which is used by governments, intelligence agencies, banks, law firms and more to scope out risks including suspected terrorists.
A professional NASCAR racing team had its computer files hacked and paid $500 in bitcoin to get their files back, according to ESPN. They estimated the value of the data at $2 million. They have since hired a security firm called Malwarebytes, which
Since two-factor authentication became the norm for web services that care about securing your accounts, it's started to feel like a security blanket, an extra layer keeping your data safe no matter whether your password is as strong as 8$&]$@I)9[P
In a bid to thwart the latest exploitation of The DAO's smart contract code, developer Alex Van de Sande, lead designer for the Ethereum Foundation announced on Twitter that the Ethereum development community were moving funds away from .....
Ethereum developers may be pulling a rabbit out of a hat as they secure more than seven million ether and suggest that "[t]here are many plans in place to attack the child daos and either block the funds or recover them."
While the MSM has not given it extensive coverage, an apparent Romanian hacker's breach of the Clinton Foundation server shows the breathtaking level of foreign influence in the organization. Meanwhile, NATO declares computer hacking to be grounds to
The Federal Reserve Bank of New York might begin taking closer looks at international money transfers using the SWIFT network, Fed Chair Janet Yellen said on Wednesday in response to questions over a recent theft by cyber criminals.
Watch Streaming Broadcast Live:
LRN.fm
DLive
Live Chat Telegram
Share this page with your friends
on your favorite social network: