Trojan Horse
Techies say don't blow it: Any 'Trojan horse' gadgets loaded with malware could access data from the hundreds of journalists at the summit.
Like a buzzing mosquito that just won't go away, Gulbuddin Hekmatyar is back in the news. He sent a video from his unknown hideout in Pakistan, asking for reconciliation with Afghanistan's government and presenting himself as a peacemaker.
WHAT'S HAPPENING
WHAT'S HAPPENING
The defeat of terrorist networks may come, not just from the elimination of key members, but also from the disruption of the networks themselves. Such networks depend upon bonds of trust and dependable communication.
The last several years have been good for criminal hackers and bad for consumers. From last year's unprecedented string of major retailer breaches to the massive JP Morgan hack and Sony's epic debacle, hackers have been almost unstoppable. So what should consumers expect for 2015?
It's ironic that Mr. Peabody & Sherman has a sequence involving the Trojan horse. Because according to the director of this production, this animated feature is actually something of a Trojan horse in and of itself.
Nicholas Moore's art is campy, surprising, lucid, fussy, symbolistic, and sincere. At times impulsive, sometimes reactive, British native Moore manages all of the above by letting his instincts guide him.