Smart homes as easy targets for hackers, a virtual-reality gaming headset, and researchers developing a drone that could steal data from smartphones it flies over.
The US giving up administrative control of the Internet, a European Parliament committee vote challenging Net neutrality, and an open source project aiming to build mobile networks inexpensively.
Java as malware developers' favorite target, a headset that beams video directly into user's eyes, and a tiny computer that a user wears in the ear and controls with facial movements.
Security problems with healthcare-related companies' networks that could compromise patient privacy, Google's prototype smartphone that can view the word around it in 3D, and a mobile app that helps …
A recent DDoS attack being the biggest ever measured, privacy concerns about a major US airport's information-gathering lighting system, and a new energy-saving trend in which supercomputers are kep…
Problems with bitcoin threatening the virtual currency's viability, a new technology called GOTCHA that provides online security, and experts warning Olympic Games attendees to expect hacking and cyb…
Hackers conducting the first Internet of Things attack, an apparent mistake by Chinese censors diverting a huge volume of China's Internet traffic to a small US company, and the increased connectivit…
A federal court overturning the US's controversial Net neutrality policy, the theft of credit-card data that could affect 40 percent of South Korea's population, and Google developing a smart contact…
Yahoo's European advertising website serving malware to hundreds of thousands of visitors over the New Year's holiday period, businesses increasingly working with open source software after years of …
The aftershocks of the huge security breach that the Target company experienced, a boost for an organization that is trying to reduce online activities' dependence on passwords, and a high-tech tenni…
Yahoo Mail experiencing a long outage, actions and statements by various governments hurting the bitcoin virtual currency, and headgear that notifies coaches about head injuries that athletes experie…
A plan by companies to design a framework for the Internet of Things, DARPA's development of video games that could help identify software vulnerabilities, and researchers finding two flaws that coul…
A flaw in a vital communications protocol used by utility companies, mobile broadband adoption increasing rapidly except in countries with less-developed economies, and research on biometric systems …
Attacks in which hackers hijack Internet traffic, a new system designed to help people who suffer accidental falls, and the first accredited university to let students pay for tuition with bitcoins.
The Anonymous hacking group attacking US government sites and stealing information, the Stuxnet worm infecting the International Space Station, and researchers using GPS to track a giant iceberg that…
A plan to close the WHOIS system for domain-name registration records, a program offering bug bounties for the entire Internet, and a study showing that streaming media consumes the greatest amount o…
Scientists have developed a way to hide data within voice-over-IP packets, enabling people to secretly send information to others while having a normal phone conversation.
The announcement that 141 million smartphones run an application that allegedly captures information about users has caused a storm of controversy, including denials from the software’s vendor.
00:04:52 |
Fri 20 Jul 2012
Disclaimer: The podcast and artwork embedded on this page are the property of IEEE Computer Society. This content is not affiliated with or endorsed by eachpod.com.