The dog lives, but this video is still a graphic and potentially disturbing look inside what a wolf attack really looks like.
Chomp! Snatch! Snap! Attack. Here is a wonderful collection of killer animals from BBC Earth Unplugged showing the animals’ unique attacking methods attacking in slow motion. You’ll see owls and crocs and chameleons and praying mantises and others go through their specialty in all its detail. I think the chameleon is…
The huge fish always eats the less huge fish: Witness the attack of a white shark against a younger one recorded on Neptune Island, 50 miles off the coast of Australia. Perhaps it was a mistake—the big one seemed headed to the bait when the small one crossed its path closer—but the final result is just the same.
The attack against ISIS in Syria has begun, according to the Pentagon Press Secretary Rear Admiral John Kirby: "US military & partner nation forces have begun striking ISIL targets in Syria using mix of fighters, bombers and Tomahawk missiles." The US Navy has released these videos to prove it.
Scientists from the Woods Hole Oceanographic Institute recorded this video of great white sharks fiercely attacking their SharkCam, an autonomous underwater vehicle with several cameras inside pointing at different directions. It shows how they attack their prey in Guadalupe Island, Baja California, Mexico.
Look, a lot of people have crazy life stories to tell. They bought a used car formerly owned by Bob Saget or they were on a camping trip, peeing behind a tree when a bear walked by. Quality stories all. But this South African tour guide was, and I can't emphasize this enough, actually in the mouth of a hippopotamus.…
The Chinese continue to upgrade their military to new levels. This is their new attack helicopter, the Z-19, a two-seater painted in badass black that looks a lot like the Eurocopter Dauphin.
If it wasn't true before, it's definitely true now. Hacking isn't just for giggles, it's a major threat to international security.
Thousands of people in Australia are in shock after finding out their web sites are gone due to the antics of a hacker and poor network management by their web host.
Meesha looks like an adorable kitty, and I'm sure she's a joy to be around. But something about the Cat Toy app unleashes the jungle beast within. Hardware lovers beware: you're about to witness savage iPod abuse.
Make this a lesson in how to drum up some much-needed interest in a should-be-obsolete phone: ensure your Chinese live-stream announcement gets hacked with a snippet of porn. Works a charm! UPDATED
Remember those cyber attacks on several companies which somehow led to Google refusing to continue censoring searches in China? According to antivirus maker McAfee, Internet Explorer security flaws are one of the key culprits for what's now called "Operation Aurora."
Despite the fact that TMZ pays to have eyes everywhere, they couldn't actually get footage of Tiger Woods' mishap with his wife. So what did a Taiwanese news program do? They made their own.
According to a Facebook executive, the target of today's DDOS attacks on Twitter, Facebook, LiveJournal, YouTube and other social media sites was one pro-Georgian blogger going by the username of "Cyxym." No word as to who was behind the attack.
We knew that the Air Force Cyber Command is supposed to fight against enemy computer attacks using their skillz, computer programs, and massive PlayStation 3s networks. Now Christian Lowe at Defense Tech reveals that, if they can't stop the attacks using a terminal, the US military hackers can actually order a cruise…
When most of us look at this Russian group CD-ROM cult, we're silently relieved that the Cold War is over. I mean, how does one defend against assailants armored with the best hits of the 80s, 90s and today? Your only real defense is to make friends over a bottle of wine and some cured meats. Hit the jump for a photo…
Our even more jaded friends at the Consumerist received an interesting tip regarding big cellphone insurance provider Asurion's exclusion of coverage. This is direct from the policy: