Our show is all about heroes making great strides in technology. But in InfoSec, not every hero expects to ride off into the sunset. In our series fin...
What began as a supposed accounting error landed Cliff Stoll in the midst of database intrusions, government organizations, and the beginnings of a ne...
It’s a strange situation when someone can hold something hostage from halfway around the world. It’s tragic when your own pictures and files are remot...
All communication leaves the possibility for crossed wires. And as we become more connected, there’s a chance for those with ill intentions to steal o...
Overwhelming numbers are scary—even in the best of circumstances. You can plan for them, build up your defenses, and do everything imaginable to prepa...
Logic bombs rarely have warning sounds. The victims mostly don’t know to expect one. And even when a logic bomb is discovered before it’s triggered, t...
Sometimes a fun game, a friendly email, or an innocuous link can be the most convenient place for an enemy to hide. And its prey is none the wiser—unt...
Computer viruses and worms haunt the internet. They worm their way into a system, replicate, and spread again. It’s a simple process—with devastating ...
Malware haunts us all. Viruses, worms, trojan horses, and the harm they do often corrupts the promise of the internet. But the world of computing cont...
Self-driving cars are seemingly just around the corner. These robots aren’t quite ready for the streets. For every hyped-up self-driving showcase, the...