A new method of recording brain activity affords scientists unprecedented monitoring -- and yes, it involves temporarily removing a portion of a patient's skull to insert packets of electrodes.
Yes, it seems US and UK spy agencies tried to snoop on people's smartphones, the company says. But privacy and security harm to users is limited by Gemalto's own network security and newer encryption used on modern networks.
The Guardian newspaper posts classified documents showing intelligence analysts have broad access to intercepted communications but aren't supposed to "target" Americans.
A newly discovered program, dug out of the leaked Snowden documents, could even let the spy agency introduce vulnerabilities in the networks to help it listen in.
Arguably the world's most famous hacker, Kevin Mitnick says even he's on attackers' hit lists. That's why he decided to make his next book a guide to practical safety for everyone on the Internet.
Longtime Pentagon correspondent Richard Whittle investigated the unmanned aircraft that gave the military the ability to attack targets from the other side of the world. He talked to CNET about the drone.
Whether you're conducting an interview or just want to capture a bad customer-service call for posterity, these are your options.
Apple's CEO tells Charlie Rose that Apple is not in the business of collecting customers' personal information.
Deep packet inspection standard adopted despite Germany's warning that it will "empower" censorship. Other uses: detecting BitTorrent transfers and identifying "copyright protected audio content."
The Air Force's 346th Test Squadron ensures the service's aircraft, including Air Force One, don't unintentionally leak important data. CNET Road Trip 2014 was all ears.