Researchers at China's Southeast University of Nanjing have moved closer to cloaking technology by being able to alter an object's appearance on radar scopes.
Read More »Security
Rumor: Sony Prepping “Hack-Proof” PS3?
Rumors are swirling that Sony, still embattled with hacker George Hotz over his release of the PS3 rootkey, is working on a "hack-proof" SKU.
Read More »US Navy is One Step Closer to a Super Laser
The United States Navy's Office of Naval Research fired a laser that penetrated through twenty feet of solid steel. Now they hope to have a full-fledged weapons system by 2015.
Read More »Pentagon to Spend $500M on Cyber Defense
The United States Department of Defense has pledged $500 Million to research new ways to defend themselves from cyber attacks.
Read More »Stuxnet and the Uncertain Future of the Internet of Things
The Sunday New York Times' thrilling coverage of the uncovering of the Stuxnet worm prompts questions that complicate images of the coming Internet of Things.
Read More »Wikileaks and the End of Stolen Kisses
Slavoj �i�ek says that Wikileaks is hated not because of the secrets it has revealed, but because it exposed the cynicism of a system that has long stopped believing in the values it imagines itself to uphold. It's a problem not only for diplomacy and governance, but for the eroding distinction between public and private life.
Read More »For the Savvy, Hacking GSM Phones is Cheap and Easy
Obsolescing 2G networks furnish security loopholes in mobile networks, which malicious hackers may find easy to exploit.
Read More »In 2010, the EFF leveled up
In 2010, the Electronic Frontier Foundation fought copyright monopolies, walled-garden mobile phone formats, and privacy invasion in the social media, helping keep the Internet safe�even for 8-bit nostalgia. Video after the jump.
Read More »Bradley Manning is the key
With Julian Assange now free on bail in England, we should ask what the plight of his forsaken source has to say about the Wikileaks moment.
Read More »For Protection from Bluetooth Viruses, Turn to the White Worm
Engineering beneficial computer viruses to protect wireless devices, researchers learn to treat time as a network.
Read More »