Steve Jobs, mastermind behind Apple, has resigned as CEO of the company effective immediately. Tim Cook, formerly Apple, Inc’s chief operating officer, has been named the new CEO, Apple’s board of directors announced on Wednesday. Jobs has been appoi
For the first time in fifteen or more years, Redmond faces a genuine challenge to its Windows desktop monopoly. The threat isn't coming from Linux or from Mac OS X or from any other operating system.
Watch ALL 8 videos: You know the old saying, “a watched pot never boils”? Plants are like that. They grow and change slowly, so you stop paying attention and then they surprise you by growing seemingly overnight.
Things are bad in England. In addition to arresting some 1,100 people and nearly tripling the number of police officers in London, police forces have been attempting to use technology to rein in the looting and rioting in the various English cities.
Worried about privacy on the Internet? It may be worse than you thought — with rapidly improving face recognition technology, your automatically tagged Facebook pictures could help a stranger, or the authorities, quickly identify you on the street.
In the half-century since Malcom McLean, an entrepreneurial former trucker from North Carolina, first began packing freight onto ships in uniform steel boxes, shipping containers have transformed the way we move most of the goods on Earth.
The latest perceived target for cyber criminals: the automobile. The DOT has a vision for a networked automotive future in which cars speak to each other and to roadway infrastructure via wireless communications.
Research in Motion, whose Blackberry handsets dominated the mobile phone scene only a few short years ago, announced Monday it was cutting 2,000 jobs — about 11 percent of its global workforce...
A journalism student at the University of Nevada at Las Vegas who used the online alias "No" and "MMMM" faces 15 years in prison and $500,000 in fines if she is convicted of hacking charges related to the group "Anonymous."
Using a nanosensor "tattoo" and a modified iPhone, cyclists could closely monitor sodium levels to prevent dehydration, and anemic patients could track their blood oxygen levels.
To a computer, words and sentences appear like data. But AI researchers want to teach computers how to actually understand the meaning of a sentence and learn from it.
Google’s latest social networking venture, Google+, has proven wildly popular. One estimate by Ancestry.com founder Paul Allen pegs the service at 9.5 million users as of Tuesday morning.
For 25 years, the field of robotics has been bedeviled by a fundamental problem: If a robot is to move through the world, it needs to be able to create a map of its environment and understand its place within it.
For phone modification junkies, the Android software platform comes with a host of mod-friendly features. It’s too bad, then, that Motorola’s latest Android phone lacks all of them.
It isn’t often that you hear about a stolen laptop being returned to its rightful owner — but still, that’s not really news. Toss in a police raid in Argentina and the recovery of about a $1 million in counterfeit U.S. bills — now you have a story.
To combat cyber attacks, the U.S. may need more than new cyber defenses. It might need a whole new piece of Internet infrastructure. So says former CIA director Michael Hayden, who served under President G.W. Bush, and he’s not the only one.
Information security researchers from academia, industry, and the U.S. intelligence community are collaborating to build a pilot "prediction market" capable of anticipating major information security events before they occur.
The Internet vigilante hacker group Anonymous claimed to have broken into an Apple Inc server and published a small number of usernames and passwords for one of the U.S. technology company's websites.
I got a prized early invite to Google+, the search giant’s highly anticipated Facebook competitor, thanks to the magic of Wired’s Steven Levy. But I could not find it anywhere.
Google made a big splash this week with the launch of a new social sharing service, Google+. But like any new social network, it takes a little practice to share the right information with the right group of people.
Google has thrown its hat into the social networking ring with Google+. Or rather, it’s throwing the latest of several hats into the ring, the previous hats having been stomped into wads of filthy felt scraps.
I got a prized early invite to Google+, the search giant’s highly anticipated Facebook competitor, thanks to the magic of Wired’s Steven Levy. But I could not find it anywhere.
Known as TDL-4 (it’s the fourth iteration of the malicious program), this particular little nuisance hides in places security software rarely checks and speaks with other infected machines and their overseers in a novel encrypted code.
Japan's Sony Corp., victim of one of the largest data breaches in history, voiced support on Wednesday for cybersecurity legislation being considered by the US Congress.
Facebook confirmed on Wednesday that it has hired George Hotz, a celebrated hacker known as "GeoHot" who was sued by Sony for hacking the Japanese company's PlayStation 3 game console.
Watch Streaming Broadcast Live:
Flote
LRN.fm
DLive
Live Chat Telegram
Share this page with your friends
on your favorite social network: