Neighbours enjoy Madrid’s outdoor Cinema Usera.
Todo por la Praxis
Born seemingly spontaneously out of a desire to create and manage shared spaces, Madrid's "citizen laboratories" are using new tools to build a new vision of how cities should be planned and run.
Attorney General Jeff Sessions testifies before the Senate Intelligence Committee hearing.
AP Photo/Alex Brandon
Did the attorney general help create a false story on why Comey was fired? Sessions' testimony to Congress provides no answers.
A subject plays a computer game as part of a neural security experiment at the University of Washington.
BCI devices that read minds and act on intentions can change lives for the better. But they could also be put to nefarious use in the not-too-distant future. Now's the time to think about risks.
It’s software: There’s always a way in.
BeeBright via shutterstock.com
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Not all hackers can be bad for an organisation: the white hat or ethical hacker can help.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
How’s this setting?
When it comes to smart vibrators, be sure to use data protection.
A way in for government would also allow hackers access.
Using sound waves to disrupt sensor functions is just one of a growing number of "side-channel attacks" that could affect our devices.
How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
The latest WikiLeaks revelation shows how far the CIA can take its cyber attacks.
The world is searching – will we protect ourselves?
Graphic via shutterstock.com
The latest release from WikiLeaks, of information about CIA hacking efforts, is yet another reminder of how Americans and our government must better protect our secret information.
WikiLeaks claims the CIA has been involved in intensive hacking operations.
WikiLeaks' latest release details what it claims is the CIA's hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
Members of French presidential candidate Emmanuel Macron’s team have accused Russia of hacking the campaign.
Russia could undermine the idea of a shared European reality and sway three elections key to the future of the bloc.
Democratic National Committee Chairman Tom Perez rallies with protesters outside the White House.
Research on more than 50 government investigations reveals how partisanship can get in the way of finding answers we all agree on.
Digital information should be private and secure.
Digital communications via shutterstock.com
Recent developments at the United Nations and the G-20 suggest that the well-known human rights to privacy and freedom of expression may soon be formally extended to online communications.
Russia has been accused of interfering in the recent US presidential election.
The prospect of foreign hackers interfering with democracy is not just an American story. It could happen in Australia too, and we need to guard against it.
The internet's architecture is under attack again as a huge denial of service attack takes out major sites in US and Europe.
It’s all fun until someone gets hacked.
Prime Minister Malcolm Turnbull and senior ministers have been criticised over their use of WhatsApp, which can leave users vulnerable if their phones are hacked, attacked by malware, or simply stolen.
The Australian government is vulnerable to cyberattacks, report says.
Here are some things Australia should do to protect itself from an increasingly weaponised internet.
There will soon be billions of connected smart devices, and they could be turned against us.
A recent massive distributed denial-of-service attack by compromised Internet of Things devices highlights a growing cyber security threat.