The NSA and the VEP

The precise details behind the US government's Vulnerabilities Equities Process remain classified, but that didn't stop Atlantic Council fellow and Columbia University researcher Jason Healey from addressing the subject during his speech at this year's Defcon hacker conference in Las Vegas. Healey told his audience what he had gathered through extensive research of the VEP, a covert procedure used by the US government to determine whether to disclose its discoveries of major manufacturers' so...

The Growing Instability of Tech Headquarters

FILE - In this Nov. 5, 2014, file photo, a person walks in front of a Yahoo sign at the company's headquarters in Sunnyvale, Calif. Yahoo announced Wednesday, March 2, 2016, that the company is adding a new component to its Sports vertical: competitive video gaming. Yahoo said that Esports will offer video coverage of live tournaments, including expert commentary and interviews with top players. Esports will also include articles, scores, team rosters, schedules, player rankings, calendars and statistics. (AP Photo/Marcio Jose Sanchez, File)
There is without a doubt no more privileged and coveted job to have in the United States right now than being a high ranking tech employee for a major tech company. Whether its Apple or Google, or Facebook if you are living in or around the Silicon Valley and have the money to play you are experiencing one  of the highest qualities of life on the planet. Tech employees aalready get free food, their dry cleaning taken care of, free beer and swag, but what the biggest thing they get which is not a...

Police Use Robot to Kill Sniper

killer robot
The infamous murder of five police officers that occurred during a Black Lives Matter protest in Dallas, Texas has brought to light a new police method for controlling the threat of snipers: the use of killer robots. In an effort to avoid putting more police officers in danger during the attack, the Dallas police force used a robot to deliver an explosive device that ultimately ended the sniper's life. While robots and unmanned systems have been in use by the US military before (drones, fo...

Tech: Instruments of Social Change

We live in a time where more than ever we have the means to hear and be heard by more people than ever before across different walks of life and with different needs and wants. This is what the internet has done for us, it was made it so any cause of voice, for better or worse, no matter how insane has the ability to be heard by anyone in the world. It only takes the reality of something to be trending and soon everyone at the very least becomes familiar with it in the most broad sense and the a...

CNC Opening Up New Frontiers for Medical Devices

Today there is a substantial amount of legal requirements one must go through before they are able to manufacture the complex specifications of a medical implant. This is a good thing and ensures that what we are putting into the bodies of ourselves and our loved ones are held to the highest medical standards and quality controls across any market today or ever. However, what this has done in our demanding for excellence remains the reality that in order to make things at this high of a quality ...

Tech Alarms Attract Public Attention

The flurry of technological advancements and startups to match has left a lot of heads spinning and a lot of "industry professionals" in the dust. However, this rapid state of change seems to be far from evening out into a predictable marketplace. In fact, it's beginning to look like many of the Silicon Valley powerhouses of today (Facebook, Juniper, Twitter, etc) may be the crash-and-burn stories of the post-tech-bubble-burst era that many economists say is coming our way. Who survives and who ...

Encryption and Quantum Computing

This week researchers at MIT and the University of Innsbruck announced that they have designed and built the world's very first scalable quantum computer. With this one leap forward in technology they have essentially proclaimed as well that all existing approaches to security inherent to encryption today is now effectively obsolete. This was achieved by using five atoms in an ion trap. If you don't understand how this works, don't worry you can count the people who actually do in the world on y...

How to Know if You’ve Been Hacked

know hack
Cyber security breaches are not uncommon; in fact, they were basically all the rage in 2015, and they show no sign of slowing down. If federal government agencies can be hacked, private consumers are basically sitting ducks. Here's how you can know if your personal computer has been hacked. Unfortunately for internet users, hacker software has become so sophisticated that it's hard to detect once it's become embedded in your system. Antivirus/anti-malware software can be effective when it com...

The Debate About Web Browsers

A long time has passed since JavaScript inventor Brendan Eich's Mozilla Firefox toppled Internet Explorer from its pinnacle as the only web browser available to web users. Since then, Chrome, Safari and a handful of other browsers have cropped up, each offering different operating systems and slightly different features, but being overall the same. However, Eich's most recent attempt to disrupt the internet browsing industry promises to spice things up a little. Eich just established a startu...

Secrets Revealed Regarding Juniper Backdoor

Weaknesses in the Juniper firewall have been known since 2007 when Microsoft employee Dan Shumow held a cryptography conference in California during which he shared the discoveries that he and a Microsoft colleague named Niels Ferguson had made regarding the firewall's algorithm. Although the algorithm had been approved by the National Institute of Standards and Technology for inclusion in a standard that could be sued to encrypt government classified communication, Shumow and Furguson figure...