Hackers seeking source code from Google, Adobe and dozens of other high-profile companies used unprecedented tactics that combined encryption, stealth programming and an
[Read more]
[youtube=http://www.youtube.com/watch?v=rTlvpj7VGsY] Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information
[Read more]
WowWee Rovio Imagine purchasing a new Rovio robot. This wheeled mobile robot sports a webcam and can be accessed easily through the internet.
[Read more]
Quantum cryptographic networks usually work by entangling two light particles, or photons. But individual photons can only travel so far down a fibre
[Read more]
Almost 600,000 genetic profiles taken from innocent people have helped swell the National DNA Database to cover about seven per cent of the
[Read more]
The International Data Protection and Privacy Commissioner’s conference brings together hundreds of privacy commissioners, government regulators, business leaders, and privacy advocates who spend
[Read more]