Geek Swagger

By The Big Island Reporter | Because Game Recognizes Game...

Yuval Harari's New Book Feeds the Tech Czars' God Complex

Silicon Valley big shots like Sergey Brin and Peter Thiel are obsessed with immortality, and historian Yuval Harari's new book plays right into their fantasy.<p>What do the most powerful people in the world read? For Donald Trump, the depressing but familiar answer is nothing beyond tweets and …

Silicon Valley

Their code was used to hack Sony and create 'WannaCry.' Meet the 'Lazarus Group,' the armed robbers of the Internet

On Feb. 4, 2016, as employees left work to enjoy their weekends, the central bank of Bangladesh began firing off dozens of transfer orders to the Federal Reserve Bank of New York, asking to remove money from its accounts — almost $1 billion.<p>It was a heist. The robbers hadn’t walked in with guns or …

Security

U.S. intelligence chiefs say reviewing use of Kaspersky software

WASHINGTON/TORONTO (Reuters) - U.S. intelligence officials told a Congressional committee on Thursday they are reviewing government use of software from Russia's Kaspersky Lab as senators raised concerns that Moscow might use the product to attack American computer networks.<p>National Security Agency …

Cybersecurity

The 25 richest people in UK tech

The British tech scene can't help but compare itself enviously to Silicon Valley.<p>It doesn't have the multi-hundred-billion-dollar tech giants like Facebook and Google, or the 11-digit billionaires like Mark Zuckerberg and bill Gates.<p>But at the end of the day, the British tech scene has still …

Wealth

Inc.'s 30 Under 30, the Most Brilliant Young Entrepreneurs of 2017 | Inc.com

30 Under 30<p>From left: Han Jin of Lucid VR, Karen X. Cheng of Karen X., Vladimir Tenev of Robinhood, and Laura Behrens Wu of Shippo Emily Shur<p>Meet the 30 Most Brilliant Young Entrepreneurs of 2017<p>Millennials get a bad rap for being overindulgent, needy and entitled, but these young founders would …

Startups

The five scariest hacks we saw last week

If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs and even oil refineries.<p>That was the message at this year's Black Hat and DefCon computer security conferences, which took place last …

Why Facebook Keeps Beating Every Rival: It’s the Network, of Course

The tech world just witnessed a robbery. The heist was so brazen you kind of had to admire it, even if it was pulled off with all the grace of a gas station stickup.<p>Facebook barged into Snapchat’s happy Venice Beach, Calif., mansion, took a solid inventory of the goods, then lifted the crown …

Facebook

A day on the internet in 2017: an internal transcript

I’M OUTRAGED AT THE STATE OF THIS COUNTRY I DON’T EVEN UNDERSTAND WHAT IS WRONG WITH EVERYONE AND — hold up, is that a hedgehog wearing a sombrero? …

Why Does Android Use More Data than iPhone? (And How Can You Fix It?) | Drippler - Apps, Games, News, Updates & Accessories

Introduction<p>If you try to research the topic online, it doesn’t take long to discover that there are two parties of thought in direct opposition to …

Microsoft finally says goodbye to Windows Vista

Vista support ends today<p>Microsoft is bidding farewell to Windows Vista, more than 10 years after it first debuted. Support for Windows Vista ends today, meaning users will have to move to a more recent version of Windows to remain secure. It’s the end of an era for an operating system that arrived …

Where does the Ubuntu Linux desktop go from here?

Ubuntu's moving to a Gnome 3 desktop from here on out. Here's the plan.<p>Seven years ago, Canonical moved the Ubuntu Linux desktop from the Gnome 3.x …

15 free games that will help you learn how to code

When I started learning to code, the options were limited—lots of books (not even e-books), some very basic online tutorials, and a whole lot of experimentation.<p>Online learning has come a long way in the last few years. There are interactive courses, tons of online tutorials, and one of my personal …

Programming

Within the Next Decade, You Could Be Living in a Post-Smartphone World

The Way of the Beeper<p>One day, not too soon — but still sooner than you think — the smartphone will all but vanish, the way beepers and fax machines …

The internet wonders: What are those weird gizmos in Trump’s Situation Room at Mar-a-lago?

This is the room where the airstrikes on a Syrian air base were ordered Thursday night. We've seen the Situation Room before, but Trump's version of it has some weird new devices on the table. Small videoconferencing monitors, game controllers? Nobody seems to know. Obama didn't have 'em . . .<p>MS

An exciting collection of Cool Technology Videos and more

FBI Arrests Hacker Who Hacked No One

He built a piece of software. That tool was pirated and abused by hackers. Now the feds want him to pay for the computer crooks’ crimes.<p>Taylor Huddleston woke early on December 6th, hours before the Arkansas winter morning would stir to life with the sound of roosters and dogs. Since selling off …

Security

Can Silicon Valley's Autocrats Save Democracy?

Honolulu Civil Beat is focused on investigative and watchdog journalism, in-depth enterprise reporting, analysis and commentary that gives readers a …

Smash Sisters events invite women gamers to play, connect and smash

On a Saturday in January, as millions around the world march for women's rights, two women fight in the San Jose Convention Center. About 100 people …

Congress Just Made It Harder for You to Shield Yourself From Internet Discrimination

Did you spend eight hours binge-watching Netflix last night? Or did you search the Internet to read about birth control options, find a new church, …

Why Tech's Latest Fashion Accessory Is a Face Mask

Silicon Valley’s Fashion Week isn’t your typical gaga-for-Gucci spectacle. Instead of haute couture, futuristic LEDs light up the venue. …

Privacy

Information Wars: A Window into the Alternative Media Ecosystem

Conspiracy Theories, Muddled Thinking, and Political Disinformation<p>Background: <b>Examining “Alternative Narratives” of Crisis Events</b><p>For more than three …

WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code

If the CIA wants inside your Mac, it may not be enough that you so carefully avoided those infected email attachments or maliciously crafted web …

Security

The Clever ‘DoubleAgent’ Attack Turns Antivirus Into Malware

Your antivirus software might come with some annoyances. It might slow your computer down, or pop up so many alerts that you can’t tell when …

Information Security

Apple’s Next Big Thing: Augmented Reality - Bloomberg

Tim Cook has talked up a lot of technologies since becoming Apple Inc.'s chief executive in 2011. Driverless cars. Artificial intelligence. Streaming …

Bro culture is poisoning Silicon Valley

In an hour-long talk today at SXSW, best-selling author Dan Lyons broke down bro culture in three parts: What is it? Why does it exist? How do we fix it?<p>Lyons, author of the New York Times bestseller <i>Disrupted: My Misadventure in the Startup Bubble</i>, delivered a compelling talk in on his experience …

Silicon Valley

Microsoft's first-ever desktop PC blows away the Mac

Computers are kind of boring, right?<p>Whether you're a Mac fan or a PC person, I can hand you any laptop in the world, you can log into your Facebook and Google accounts, and do probably 90% of what you need to do. It means that, for a lot of people, one computer is pretty much interchangeable with …

Microsoft

A Jacket Made From Electronic Thread Goes on Sale This Year

A Smarter Way To Dress<p>We have been trying to update our clothing for quite some time now. From clothing that can help us with our work out to …

Can you solve the chess problem which holds key to human consciousness?

It might look like a simple chess problem, but this puzzle could finally help scientists uncover what makes the human mind so unique, and why it may never be matched by a computer.<p>75 years after Bletchley Park sought codebreakers in the Second World War by placing a crossword in The Telegraph, …

Artificial Intelligence

This is what hackers at the CIA make of your computer's security

<i>Updated</i> | Of all the revelations from WikiLeaks’ CIA data dump this week, one of the most informative has been the intelligence agency’s views on the …