Don’t listen to pundits who say the intellectual property system has outlived its usefulness. It needs to be updated, not abolished
Researchers discover a dangerous weakness in computer hardware
A pair of security researchers in the U.K. have released a paper [PDF] documenting what they describe as the “first real world detection of a backdoor” in a microchip—an opening that could allow a malicious actor to monitor or change the information on the chip.
Soldier launching a Puma drone At a time when drone aircraft have become a daily feature of the news and are about to proliferate in U.S. airspace, it’s a good idea to take a step back and examine a very basic and very important question: What, exactly, is a drone?The answer turns out to be more complex than might be expected.
Last week President Obama signed a sweeping aviation bill that, among other things, will open the skies to "unmanned aircraft systems," more commonly known as drones.
New technologies will let location-tracking efforts begin after the fact
These popular, unmanned aircraft will eventually fall into the hands of hostile nations and terrorists
In a world in which nearly anyone can purchase a device capable of photographing locations behind walls, gates and fences, will anyone be able to keep a secret?
Continued advances in unmanned aerial vehicle technology have profound implications regarding the nature of modern warfare
If, in the early 1980s, the U.S. government had proposed a new crime-solving program requiring every adult to carry a small device that not only performed location tracking but also recorded the phone numbers of all recent contacts, opposition would have been swift and indignant.
As if software viruses weren't bad enough, the microchips that power every aspect of our digital world are vulnerable to tampering in the factory. The consequences could be dire
Computers that modify their hardware circuits as they operate are opening a new era in computer design. Because they can filter data rapidly, they excel at pattern recognition, image processing and encryption