Devastating vulnerabilities are hiding in the technology in programs, protocols, and hardware all around us. Most of the time, you can find ways to protect yourself.
Despite concerns about power draw, many AV companies are forging ahead with battery-driven technology. Why?
Data mining recently made big news with the Cambridge Analytica scandal, but it is not just for ads and politics. It can help doctors spot fatal infections and it can even predict massacres in the Congo.
Coming generations of AVs won’t be risk-free in all circumstances, but that’s not necessarily a bad thing.
As we hurtle through the development of the digital world, it's important to keep in mind the security implications of the technology we use.
In the early 1980s, IBM engineers had a hard time figuring out inexplicable computer module failures in Denver, Colorado. When they finally cracked the puzzle, the cause turned out to be otherworldly.
Science writing can seem intimidating, but taking the plunge taught me just how manageable and enjoyable it is.
A number of companies are getting closer to extracting resources from space rocks.
Rising computerization opens doors for increasingly aggressive adversaries, but defenses are better than many might think.
Computer-security methods could help scientists identify disease-causing genes—while preserving patient privacy.
Even if they can exchange their ransom, the criminals will have a hard time accessing their money anonymously.