Two Tennessee women say Uber failed to protect them.
Ajit Pai is taking heat after reports that the FCC falsely said a cyberattack knocked a public comments page offline during the net neutrality debate.
So, tell me about your work experiences.
The crazy stunt is looking to raise money for charity.
Hacked appliances could overwhelm the grid, researchers say.
The move comes as Santa Monica ranks the ride-hailing companies over Bird and Lime for its scooter pilot program.
Watch out, Apple Watch.
Security is a process that requires hitting people over the head with their errors
Building warnings into crypto libraries that alert developers to unsafe coding practices turns out to be an effective way to improve the security of applications.…
Musk hasn't submitted any official proposals or documentation yet, but that won't keep the board from getting ready.
Five years ago billionaire Elon Musk open-sourced his plan for a supersonic train-like thing. Today it's still a work in progress.
BMW's most affordable convertible is equal parts premium and fun to drive.
Obsolescence is an increasing part of modern car ownership.
Ethan Peck is joining the show for its second season.
But it requires custom hardware, firmware and access to your Wi-Fi
DEF CON Hackers have managed to hack Amazon's Echo digital assistant and effectively turn it into a listening device, albeit through a complex and hard-to-reproduce approach.…
MoviePass says the issue's now fixed ahead of its plan change.
The filmmakers' audio commentary uncovers new (and sometimes hilarious) information.
Actor Ethan Peck gets a warm Vulcan greeting as he joins Star Trek: Discovery.
Another day, another speculative execution-based attack. Data protected by Intel's SGX—data that's meant to be protected even from a malicious or hacked kernel—can be read by an attacker thanks to leaks enabled by speculative execution.
Since publication of the Spectre and Meltdown attacks in January this year, security researchers have been taking a close look at speculative execution and the implications it has for security. All high-speed processors today perform speculative execution: they assume certain things (a register will contain a particular value, a branch will go a particular way) and perform calculations on the basis of those assumptions. It's an important design feature of these chips that's essential to their performance, and it has been for 20 years.
The 5G race is starting to heat up.
Bringing back see-through controllers in a big way.