Steve Wozniak on AI: Will we be pets or mere ants to be squashed our robot overlords?

Steve Wozniak on AI: Will we be pets or mere ants to be squashed our robot overlords?

Apple co-founder Steve Wozniak predicts a 'scary' future when artificial intelligence takes over from humans. It will be 'very bad for people,' but will we be pets to our robot overlords or mere ants to be squashed?

03/25/15

Tech-savvy NYPD cop allegedly hacked NYPD computer and FBI database to run a con

Tech-savvy NYPD cop allegedly hacked NYPD computer and FBI database to run a con

An NYPD auxiliary cop was busted for installing electronic devices in an NYPD Traffic Safety Office; one was a hidden camera in a cable TV box that he would check before using the other to remotely access a police computer and then...

03/23/15

Darknet's Evolution drug marketplace poofs along with $12 million in bitcoins

Darknet's Evolution drug marketplace poofs along with $12 million in bitcoins

Another high stakes bitcoin heist may have happened on the deep web as Evolution Market, the biggest drug marketplace on the darknet, vanished; users and vendors are out for blood, blaming the admins for stealing about $20 million in...

03/18/15

Gamers targeted by TeslaCrypt ransomware: $1,000 to decrypt games, mods, Steam

Gamers targeted by TeslaCrypt ransomware: $1,000 to decrypt games, mods, Steam

Gamers are being targeted by crypto-ransomware for the first time. TeslaCrypt encrypts and holds over 50 game-related files -- both single player and multiplayer games, Steam and game development software -- for a ransom of about...

03/16/15

Wikimedia fights for fundamental right to privacy, sues NSA over mass surveillance

Wikimedia fights for fundamental right to privacy, sues NSA over mass surveillance

'Bring it,' Wikipedia founder Jimmy Wales told the NSA as Wikimedia fights for the fundamental right to privacy by suing to stop NSA mass surveillance.

03/11/15

Physics researchers map where to run and hide during a zombie apocalypse

Physics researchers map where to run and hide during a zombie apocalypse

Cornell University researchers presented “You Can Run, You Can Hide: The Epidemiology and Statistical Mechanics of Zombies” and created a zombie susceptibility map, Zombie-town USA, which simulates a zombie infestation based on how...

03/09/15

Email warned would-be FBI surveillance program whistleblower of retaliation

Email warned would-be FBI surveillance program whistleblower of retaliation

An email warned a would-be FBI surveillance program whistleblower that reporting abuse of authority could bring down the retaliation hammer on the agent, even though that's illegal. A Senate committee heard testimony today about the...

03/04/15

Mobile World Congress: Bye-bye passwords, hello to biometric authentication in a blink

Mobile World Congress: Bye-bye passwords, hello to biometric authentication in a blink

Biometric solutions at Mobile World Congress move us closer to killing off passwords. Fujitsu announced a prototype smartphone that authenticates a person via iris recognition; the new ZTE Grand S3 uses eyeprint authentication scans...

03/02/15

UK researchers shatter world record by hitting 5G speeds of 1Tb per second

UK researchers shatter world record by hitting 5G speeds of 1Tb per second

UK researchers smashed the previous 5G record and holy smokes the new one is fast! Imagine being able to download 1Tb per second on your smartphone or tablet!

02/25/15

200 virtual line jumpers exploited 'technical backdoor' to score Burning Man tickets

200 virtual line jumpers exploited 'technical backdoor' to score Burning Man tickets

Nearly 80,000 people were waiting in a virtual line queue to purchase 40,000 Burning Man 2015 tickets. About 200 techies allegedly 'exploited' a backdoor in the ticketing system to cut in front of other Burners in line and buy the...

02/23/15

Mall security guards allegedly misuse CCTV to stalk women and share 'sleaze file' photos

Mall security guards allegedly misuse CCTV to stalk women and share 'sleaze file' photos

Security guards in Australia's Westfield Sydney shopping center are accused of stalking women via the mall's CCTV before tagging, saving and sharing secret 'sleaze file' photos.

02/18/15

Climate researcher claims CIA asked about weaponized weather: What could go wrong?

Climate researcher claims CIA asked about weaponized weather: What could go wrong?

The Pentagon claimed climate change is a national security issue, but even as a panel of experts suggest real-world geoengineering tests to change the climate, a climate scientist claims the CIA asked if a country controlling the...

02/16/15

Of 10 IoT-connected home security systems tested, 100% are full of security FAIL

Of 10 IoT-connected home security systems tested, 100% are full of security FAIL

The Internet of Things space is the new Wild West and home security systems are not nearly as secure as you may think; in fact, HP researchers tested 10 of the newest home security systems and discovered IoT-connected home security...

02/11/15

ISIS is a virus that Anonymous plans to cure: Hacktivists hammer ISIS with #OpISIS

ISIS is a virus that Anonymous plans to cure: Hacktivists hammer ISIS with #OpISIS

Anonymous launched #OpISIS, waging cyberwar against ISIS propaganda-spewing social media accounts and jihadist militant recruitment sites.

02/09/15

Detecting zero-day hack in one millisecond with 'power fingerprinting'

Detecting zero-day hack in one millisecond with 'power fingerprinting'

A company claims its tech can detect a zero-day hack in one millisecond by monitoring the 'power fingerprint' of a system or device. Testing in cooperation with the Department of Energy, PFP Cybersecurity tech detected Stuxnet even...

02/04/15

Hacker hijacks wireless Foscam baby monitor, talks and freaks out nanny

Hacker hijacks wireless Foscam baby monitor, talks and freaks out nanny

This is the third time news has circulated about some jerk hijacking a wireless Foscam camera/baby monitor and made his virtual intrusion known by talking. Please change the default password!

02/02/15

Drones infected with malware can drop from the sky or be hijacked for surveillance

Drones infected with malware can drop from the sky or be hijacked for surveillance

A security engineer infected a Parrot AR Drone with Maldrone malware, which creates a persistent backdoor, so an attacker can remotely control the infected drone, cause it to drop from the sky, be hijacked for surveillance, or spread...

01/28/15

Malaysia Airlines claim DNS hijacked, site not hacked, but attackers threaten data dump

Malaysia Airlines claim DNS hijacked, site not hacked, but attackers threaten data dump

Lizard Squad and Cyber Caliphate hacker groups hijacked the DNS of Malaysia Airlines, so that visitors to the URL saw two different '404 Not Found' defacements. Yet Malaysia Airlines claimed its 'website was not hacked' and customer...

01/26/15

Obama's cybersecurity plan: Share a password, click a link, go to prison as a hacker

Obama's cybersecurity plan: Share a password, click a link, go to prison as a hacker

Under President Obama's proposed cybersecurity plans and CFAA amendments, you could be considered a hacker for innocent behavior like sharing your Netflix password with family members or clicking a link that contains unauthorized...

01/21/15

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets

Leaked documents indicate that the NSA was in North Korean systems but didn't warn Sony about the attack, covertly uses innocent victims’ infected PCs when hijacking botnets, as well as secretly redirecting blame to scapegoats and...

01/19/15

Load More