Bell Labs’ 202 Hack: The First Great Jailbreak?

Before laser-printers were even dreamt of, large companies had to use typesetters to render text if it were to look any good—but they were expensive and tightly controlled. Then, in the summer of 1979, engineers at Bell Labs changed all that.

Read more…


    



Don’t Freak Out About Ultrasonic Malware (Yet)

Don't Freak Out About Ultrasonic Malware (Yet)

The Internet’s been abuzz lately with news that computer scientists have found a way to transmit malware using ultrasonic audio signals. If true, this means that you’d never be safe from the hackers, as long as your computer has a microphone and speakers. But don’t freak out just yet.

Read more…


    



New Malware Can Jump Air Gaps Using Inaudible Sound

New Malware Can Jump Air Gaps Using Inaudible Sound

A team of computer scientists has developed a new breed of malware, which can leap between devices using inaudible audio signals—then covertly transmit passwords and other sensitive data without a network connection.

Read more…


    



The Dumb Ways Some Websites Store Your Passwords

In an ideal world, passwords would be secured so tightly that not even the best hacker could get the merest sniff of your details. Sadly, that’s not always the case.

Read more…


    



How YouTube Works

You’re about to watch a video via YouTube. Hell, you watch dozens of videos every day on YouTube. But do you have any idea how it works?

Read more…


    



A Future Internet Might Not Use Servers

A Future Internet Might Not Use ServersYou’d think that given how pervasive the internet is, we’d be stuck with the fundamental architecture it uses: servers that many devices connect to for their information fix. But a team of Cambridge University scientists wants to shake things up—and remove servers altogether.

Read more…


    



How a Genome Hacker Made a Family Tree With 13 Million Branches

How a Genome Hacker Made a Family Tree With 13 Million Branches

What happens if you let a genome hacker—a kind of computer scientist-turned-biologist—loose on the world’s online genealogy sites? The world’s biggest family tree is what, which shows how over 13 million people are related.

Read more…


    



Why Are JavaScript Attacks So Dangerous?

You’ve probably heard security articles talk about JavaScript being used to attack websites, but you might not know why it’s quite so dangerous. This video helps explain.

Read more…


    



How Computer Scientists Make Programs Efficient Using Upside Down Trees

How do people manage to write the neatest, most compact code to make programs super-small and lightweight? Well, there are many ways—but one of the most common is to use trees. Upside down trees, to be precise.

Read more…


    



What the Hell Is a SQL Injection, Anyway?

When you hear about major web hacks, you’ll often hear the term "SQL injection" used like everyone in the world knows what it means. They don’t. But this video will help explain so you’re not confused in the future.

Read more…