Pharmaceutical companies might not have to actively oppose cannabis legalization to cause problems for the marijuana movement.
New analysis of Barış Pehlivan's computer finds a very rare, targeted malware called Ahtapot. It only gets stranger from there.
In his new documentary "Lo And Behold," Werner Herzog explores the cave of never-forgotten dreams.
At Def Con 24, I saw the future of the internet, and it's increasingly centralized.
Online forums and chat apps are putting the power back in the hands of "compensated daters."
Protective gear worn by chemical, biological, radiological, and nuclear defense specialists in the US military just got a lot smarter.
Is there any reason marijuana aficionados shouldn’t have the same rights as home brewers?
The same approach used to regulate and manage legal marijuana in several states could be used to control knockoff weed.
Somewhere between rage face and the reaction GIF, 'biaoqing' have evolved to become an essential part of the Chinese internet.
A journey to Everest base camp to see how technology is changing the world’s highest peak.
You need this because the government is poisoning the water.
I'd quit my full-time job and wanted to try my hand at ghostwriting. I also had no “prepping” expertise to speak of.
Louis Sarno went to record the music of the Central African Republic's Bayaka community in the 80s and never turned back.
Even amid steady streams of images of real-life disasters, the ones in movies are dulling our sense of what real-life is.
There is no consensus within IS over which encrypted applications to use, whether it be for migration or coordinating attacks.
How hackers could take control of your car’s engine, brakes, and even the steering wheel.
In preparation for an age of biometric data megabreaches, I covered my real fingerprints with replaceable, fully-functional fake ones that are nearly impossible to copy.
A century after the 1916 Jersey Shore attacks, sharks are more threatened than ever—by us.
This week, in middle-of-nowhere Utah, a NASA contractor tested the rocket booster that will get future astronauts to deep space. I went.
A lesson in the dangers of cyber weapons—which, like so many modern tools, are the dangers of unintended consequences, and the dangers of going too far.
Moral complexities ultimately require making a choice.
In an era of mega-breaches, digital packrats are amassing, swapping, and sourcing leaked passwords and other personal information like any other collectible.
“Without learning how to use these things we will be abandoned by the times.”