If you're the kind of person who likes to hang out in the local Best Buy checking out its big home theater or playing video games without ever actually buying something, new security software could mess up your strategy.
Whatever you think of the Alien prequel Prometheus, it's hard to deny that one of the coolest parts is when the mohawked geologist throws his robotic sensor drones to map the alien ship. Now a company has taken us a step closer to such a reality with a throwable sensor and camera device.
Kim Dotcom is an attention-grabbing machine. His new ploy is to fund free broadband Internet access for his native New Zealand. He aims to win the money in a suit against the U.S. government for the takedown of his site, Megaupload, and then use it for the common good like a digital-age Robin Hood.
In today's hacking news, the National Broadcasting Company, better known as NBC, fell prey to some V for Vendetta-loving hackers. Included in the hacked pages was Saturday Night Live's homepage. Most of the hacked pages are back up, though some pages remain dead and/or nonfunctional.
The U.K. is infamous for its "ring of steel," a large array of closed-circuit television cameras (CCTV) in London designed to offer security to the city by surveilling its streets and alleys 24 hours a day. But a new report indicates that the ever watchful electronic eyes may be having the opposite effect.
Who says military drones only belong in the air? The Navy has gotten into the game, test firing missiles from a 36-foot inflatable hulled, remote-controlled boat. Six anti-armor missiles successfully struck floating targets over two miles away, fired by personnel onshore at the Patuxent River Naval Air Station.
You may not realize it, but you're already being policed by robotic systems; specifically, traffic cams. But unlike dystopian visions of humans simply rolling over and taking it from our electronic overseers, in this case there is a way to fight back, and it's called the noPhoto.
The Copyright Alert System (CAS) aims to identify pirates, notify their ISPs and then use a six-step process to "educate" users about copyright law and legal alternatives to piracy. That doesn't sound so bad on paper; a closer look reveals an intrusive, if polite, new partner in the relationship between consumer and ISP.
The non-profit Honeynet Project's HoneyMap shows a real-time visualization of cyber-attack origin points. The map looks simultaneously intimidating, and like it could make a great addition to your next rave.
Protecting the accounts of users is a huge point of concern across the Internet, but the gaming industry may have just caught a break. The PUFFIN Project (physically unclonable functions found in standard PC components) has brought forward research suggesting that GPU manufacturing processes leave each product with a unique "fingerprint."