Over the holidays, the Federal Aviation Administration (FAA) made drone owners register their vehicles. Since that announcement, more than 180,000 drones have been added to the FAA’s database, says CNN.
Dutch reject ‘encryption backdoors’

The Netherlands says it will not make tech firms share encrypted data with security agencies

How do parents monitor their teens’ usage of social media and other mobile technology? Pew Research Center surveyed parents with teens aged 13 through 17 to find out.

Werner Herzog takes on the Web with newest documentary

Werner Herzog, creator of 2005’s Grizzly Man and 2011’s Into the Abyss – a documentary examining capital punishment through the eyes of two men on death row – casts his cinematic gaze over the Web with the release of his new documentary. Lo and Behold Reveries of the Connected World is a collection of interviews from the the far corners of the Web’s connected universe. There are early pioneers of the internet’s development alongside victims of wireless radiation explaining their unique and sometimes contradictory versions of what they think the Web is. “This is an extra ordinary moment in the…
It’s only been a month since certificate authority Let’s Encrypt opened up its beta program to offer free HTTPS certificates to the public, and hackers have already begun abusing the service to distribute malware through seemingly safe domains. In December, security firm Trend Micro spotted users in Japan accessing a malvertising server, which hosted the Angler Exploit Kit that downloaded a banking Trojan onto affected Windows machines automatically.
Selfies have changed everything. And it all has to do with the science of influential marketing.
The Plan to Unite Bitcoin With All Other Online Currencies

The idea is to create a single worldwide network that can not only unite all digital currencies, but all companies and individuals who use those currencies.

The Father of Online Anonymity Has a Plan to End the Crypto War

Cryptographer David Chaum’s ideas helped spark the decades-long war between encryption and government. Now he’s back with a new idea designed to end it.


First they take our jobs, then they judge us; machines are officially taking over.

The Success of Obama’s Gun Plan Boils Down to Better Tech and More Data

It’s not as radical as gun control advocates would like or as gun rights proponents fear. It’s a workaround that depends on tech to do a better job.

Twitter is still looking to let your tweets house more than 140-characters, according to a new report. This time, we’re hearing the company is planning to release the feature sometime in the first quarter of 2016.


Veteran technology journalist Dan Gillmor’s been using GNU/Linux since 2012, switching away from all the “control freak” services, tools and software that he’d grown used to over decades of computing. (more…)

5 Key Social Media Marketing Trends to Watch in 2016

So what are the key trends that social media marketers need to look out for in 2016? While understanding what might be on the horizon, it’s equally important to look at why, and how those trends have formed over time. Here are five key things to watch for in the next year.

5 Major Hacks of the Year: 2015 in review



Fear-Mongering Politicians Will Make Tech 2016’s Scapegoat

If 2015 was the year tech became the Bad Guy, then 2016 will be the year it becomes a full-fledged Enemy of the People.

Tagged in: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Leave a Reply

%d bloggers like this: