Most gamblers were still asleep, and the gondoliers had yet to pole their way down the ersatz canal in front of the Venetian casino on the Las Vegas Strip. But early on the chilly morning of Feb.
Zoltan Istvan is a futurist, journalist, and author of the novel The Transhumanist Wager. He writes an occasional column for Motherboard in which he ruminates on the future beyond natural human ability. Over the next decade, we’ll see the rise of lightweight drones that fit in your pocket.
Verizon is the latest big company to enter the post-Snowden market for secure communication, and it’s doing so with an encryption standard that comes with a way for law enforcement to access ostensibly secure phone conversations.
Malware that cannot be uninstalled by the end user is being pre-loaded onto some cheap Android smartphones. The malware is pre-loaded into the system directory of the handsets at an unknown point within the supply chain.
The Ku Klux Klan (KKK) threatened to use lethal force against Ferguson protesters; Anonymous successfully retaliated against the Ku Klux Klan’s Ferguson threats by taking over two primary Twitter accounts, keeping KKK websites offline and outing KKK members.
Researchers at network security company Palo Alto Networks have uncovered a new and sophisticated form of malware which attacks iOS devices through USB connections from OS X systems. They have called it WireLurker. Palo Alto Networks says that “…
As U.S. banks and retailers are barreling toward a 2015 deadline to replace magnetic-stripe credit and debit cards with more secure cards that come embedded with a microchip, researchers have announced a critical flaw in the card system.
Drupal’s security team has released a “public service announcement” calling upon all users of the Drupal content management framework to consider their sites as compromised, and to start afresh, unless their sites were patched against the SQL injection attack revealed two weeks ago within seven hou
Edward Snowden, left, appears with Glenn Greenwald in a scene from the documentary Citizenfour. (Radius TWC/AP …The FBI has identified an employee of a federal contracting firm suspected of being the so-called “second leaker” who turned over sensitive documents about the U.S.
SAN FRANCISCO — Bob Foreman’s architecture firm ran up a $166,000 phone bill in a single weekend last March. But neither Mr. Foreman nor anyone else at his seven-person company was in the office at the time. “I thought: ‘This is crazy. It must be a mistake,’ ” Mr. Foreman said.
Several years ago, Vint Cerf visited the Guardian in his capacity as Google’s “evangelist in chief” – the kind of Silicon Valley title you can carry off only if you have invented the internet, which, luckily for Cerf, he had.
Google today announced it is beefing up its two-step verification feature with Security Key, a physical USB second factor that only works after verifying the login site is truly a Google website.
IBM Security found that over 60% of leading Android dating mobile apps they studied are potentially vulnerable to a variety of cyber-attacks that put personal user information and corporate data at risk.