Narrow your search
Specialists tapped by World Press Photo debunk an analysis that concluded that Paul Hansen's photo of children killed in Gaza was a composite of multiple images.
From lightened skin to faked wounds, experts can use tools to analyze whether images have been doctored. But it's always harder to prove a photo is real.
Traffic abilities in GPS is a hot topic, but how does it work? To learn more about the technology, services, and future, Miss Direction interviews TrafficCast's Nick Kiernan.
The urgency to patch clients and servers rises to a fever pitch as code to attack the Internet is released. Two Black Hat presenters had conflicted over the timing of the code release.
On the eve of opening up a hierarchical naming system for the Internet, ICANN's sites are hijacked with a warning from criminal hackers.
Discussion of fuel cell company Smart Fuel Cells
Archive of previous Security Bites podcasts
Malicious software somehow found its way onto a Maine-based supermarket chain's servers, which led to the security breach announced earlier this month compromising up to 4.2 million credit cards.
Suspicion centers on branch servers which collect and store credit card information for millions of customers at large retails stores.