A US combat veteran wounded by an IED is the recipient of a total penis and scrotum transplant performed by Johns Hopkins doctors during a complex 14-hour surgery.
New version turns Meltdown mitigation into a feature
The Xen Project last week sent the first release candidate of Xen 4.11 down the slipway, ahead of a few weeks’ testing and a planned release on June 1st, 2018.…
We collected everything we think we know about the Avengers' next outing right here, including plot points and who we'll see on screen.
Rules nixed by US state court over First Amendment fears
A Texas appeals court last week ruled that the US state's Relationship Privacy Act, which prohibits the disclosure or promotion of intimate images without the consent of those depicted, is unconstitutional.…
Ban on sharing private photos tramples free speech
A Texas appeals court last week ruled that the state's Relationship Privacy Act, which prohibits the disclosure or promotion of intimate images without the consent of those depicted, is unconstitutional.…
The video-sharing site has grappled with criticism it's not reacting fast enough to inappropriate content.
The uprising has become a rebellion and that's not all that's changed in season 2 of Westworld. Spoilers for episode one ahead!
Poor LG can't seem to keep a secret.
Yamaha has announced three new MusicCast 2018 receivers, starting at $450, plus wireless speakers that can be used as rears.
The video-sharing website details the reasons why millions of videos have been removed.
Zuck: Creepy data-harvesting was for YOUR own good
Stop us if you've heard this one before: Facebook is trying to 'set the record straight' after it was once again caught flogging the ability to violate the privacy of its users.…
The meat industry, a major contributor to CO2 emissions and deforestation, is facing competition.
The two companies file witness lists for the upcoming damages retrial. There won't be any CEOs on the stand.
A federal appeals court in San Francisco ruled Monday that Naruto, a "crested macaque," does not have legal standing to file a copyright claim against a nature photographer, as Naruto is not a person.
The case dates back to 2011, when British nature photographer David Slater was on a shoot on the Tangkoko reserve in Indonesia. Naruto somehow swiped Slater's camera and managed to snap a few pictures. Slater later published a book, including some of the so-called "monkey selfie" images.
People for the Ethical Treatment of Animals, the advocacy group seeking to represent Naruto, then filed a lawsuit, saying that Naruto's copyright of the image had been violated. In January 2016, a federal district judge in San Francisco ruled that Naruto had no standing: not being a person, he could not bring a lawsuit.
Here's why you shouldn't watch the Marvel Cinematic Universe in the order the films were released.
Monday's earnings story is about a sales and profit boost. The question is how much did Nest smart home devices and an investment in Uber play into the results.
While this isn't a new technology, it could be a way to reduce carbon emissions while we wait for widespread use of electric semis.
Fans of the quirky Adult Swim comedy will relish the chance to hear Peter Dinklage and the Thrones showrunners chat about the episode.
Researchers have defeated a key protection against cryptocurrency theft with a series of attacks that transmit private keys out of digital wallets that are physically separated from the Internet and other networks.
Like most of the other attacks developed by Ben-Gurion University professor Mordechai Guri and his colleagues, the currency wallet exploits start with the already significant assumption that a device has already been thoroughly compromised by malware. Still, the research is significant because it shows that even when devices are airgapped—meaning they aren't connected to any other devices to prevent the leaking of highly sensitive data—attackers may still successfully exfiltrate the information. Past papers have defeated airgaps using a wide array of techniques, including electromagnetic emissions from USB devices, radio signals from a computer's video card, infrared capabilities in surveillance cameras, and sounds produced by hard drives.
On Monday, Guri published a new paper that applies the same exfiltration techniques to "cold wallets," which are not stored on devices connected to the Internet. The most effective techniques take only seconds to siphon a 256-bit Bitcoin key from a wallet running on an infected computer, even though the computer isn't connected to any network. Guri said the possibility of stealing keys that protect millions or billions of dollars is likely to take the covert exfiltration techniques out of the nation-state hacking realm they currently inhabit and possibly bring them into the mainstream.