Microsoft explores ‘safe’ manual memory management in .Net
Microsoft Research has been experimenting with integrating safe manual memory management withnbsp;garbage collectionnbsp;(GC) in the .Net runtime.The goal is to give developers both the convenience and...
View ArticleShould ‘Made in America’ apply to cloud providers?
Letrsquo;s start by acknowledging the elephant in the room: The top three public cloud computing providers are all U.S.-based, so enterprises in the United States, and even in most other countries, are...
View ArticleSan Francisco DA: Anti-theft law results in huge drop in stolen phones
"Stealing a smartphone is no longer worth the trouble."
View ArticleAlmost time for a “major pucker factor,” as Falcon Heavy readies for launch
"This is one of those things that's really difficult to test on the ground."
View ArticleFlaws in web-connected, radiation-monitoring kit? What could go wrong?
Ripe target for ne'er-do-wells... Black Hat Vulnerabilities in widely deployed Radiation Monitoring Devices (RDMs) present a potential mechanism for triggering false alarms and worse, according to...
View ArticleAmazon made a package delivery locker specifically for apartments
Never miss a package (from Amazon or other source) again.
View ArticleWallet-snatch hack: ApplePay ‘vulnerable to attack’, claim researchers
Are you using payment system over public Wi‑Fi? Black Hat USA Security researchers say they have come up with two separate "attacks" against ApplePay, highlighting what they claim are weaknesses in...
View ArticleAfter 3 straight wins, Porsche kills its Le Mans hybrid in favor of Formula E
First Audi, now Porsche; the Le Mans hybrid class is in serious trouble.
View ArticleAn action-packed new Star Wars animated series is on YouTube now
Forces of Destiny is a series of shorts about our favorite characters' everyday heroism.
View ArticleVirgin America workers reset passwords after hacker’s crash landing
I picked a hell of a day to quit sniffing packets Virgin America's staff and contractors have been told to change their passwords after a hacker raided the airline's systems.…
View ArticleNew project taps Node.js for microservices API gateway
Looking to take some complexity out of microservices deployments, LunchBadger has built an open source API gateway to secure microservices and expose them via APIs.Built on the Express web application...
View ArticleSystemd wins top gong for ‘lamest vendor’ in Pwnie security awards
Epic fails and l33t pops celebrated by hackers Black Hat USA The annual Pwnie Awards for serious security screw-ups saw hardly anyone collecting their prize at this year's ceremony in Las Vegas.…
View ArticleWhat’s the price for flinging your workers’ private info at crooks? For...
That was one expensive email for the storage specialist Seagate will cough up $5.75m to settle a lawsuit brought after its bungling staff accidentally handed over employees' sensitive information to...
View ArticleSprint seeks merger with Charter to create wireless and cable giant
Comcast could have veto power over deal because of agreement with Charter.
View ArticleIt took DEF CON hackers minutes to pwn these US voting machines
We've got three years to shore up election security DEF CON After the debacle of the 2000 presidential election count, the US invested heavily in electronic voting systems – but not, it seems, the...
View ArticlePared-down electric experience: Driving one of the first Model 3s off the line
Standard 3 goes 220 miles for $35K, Long-range 3 goes 310 miles for $44K.
View ArticleBBCrsquo;s Micro:bit turns out to be an excellent drone hijacking tool
Much love for tiny microcomputer DEF CON The BBCrsquo;s Micro:bit computer board may be winning over school kids, but hackers have found its wireless capabilities and programmable nature make it an...
View ArticleDark web doesn’t exist, says Tor’s Dingledine. And folks use network for...
Cofounder brings us up to date on network status DEF CON A Tor Project grandee sought to correct some misconceptions about the anonymizing network during a presentation at the DEF CON hacking...
View ArticleHypnotic suggestion prevents action, not recognition
Hypnotic suggestion doesn't block sight, but it inhibits acting on visual information.
View ArticleEver wondered why US Special Forces love the Chevy Suburban so much?
Delta Force vets show us why they love Chevyrsquo;s big SUVs.
View Article