In 1995's absurd Hackers, the internet is depicted as a psychedelic trip. Not even a young Angelina Jolie can prevent the film from coming off like an amateurish mess.
Diploma mills, or faux-academic institutions, are often nothing more than glorified print shops.
In the past year our use of Twitter has increased dramatically. Unfortunately, so has the criminal hacker's attention to social media.
Just as public roads and public airspace need to be closed to securely transport the President, we need to create Securenet as a closed, secure kind of limited access information superhighway for infrastructure communications.
This piece first appeared at Motherboard Determining how people see and use information online while collecting massive amounts of data about those p...
I reluctantly enter "Tila's Hot Spot." I immediately have the familiar feeling of doing something I do not want to do. I have not felt this way in a long time.
Even if Google packs up -- and I highly doubt even the "do no evil" company would leave the world's fastest growing economy -- would the move change China's censorship regime, or prevent further hacking?
It's one thing to do a background check, which is becoming more popular for singles on online dating sites, but should you go to jail for reading your spouse's email in your own home?
The times may be very different from 1961, but the need to have a transformational possibility issued by a transcendent leader is even greater than it was then.
A group calling itself the Iranian Cyber Army briefly hacked the social messaging service Twitter last night, frustrating the efforts of narcissists to share their most mundane and banal thoughts.
IN TODAY'S AUDIO REPORT: Crunch time: COUNTDOWN to Copenhagen ... PLUS: Right-wing media in a tizzy over the hacked emails of climate scientists -...
The screaming injustice that is about to be perpetrated on Scottish computer hacker Gary McKinnon has taken another step toward the cruel and unusual.
If law enforcement happens to be chatting with a person who is using your Internet connection to trade lurid child porn, then someone may eventually knock on your door at 3AM with a battering ram.
See, I was the chubby kid in the house. My sister and brother were skinny, and encouraged to eat as much as they wanted. But my portions were skimpy.
Why hasn't the president appointed a cyber czar to monitor and secure the electronic highway from attack? His staff said he is looking for just the right person, and that takes time.
Technology has grown by such leaps and bounds since 1969 that it's hard to conceive how things were before we all had access to computers.