Although electronic voting in various forms has become more prevalent outside the U.S., its primary difficulties include its inability to verify source code and...Ars Technica From ACM TechNews | November 7, 2016
Google Brain researchers say they have developed artificial intelligence technology that can form encryptions and communicate securely.Ars Technica From ACM TechNews | November 2, 2016
Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect their messages from a third AI, which was trying...Ars Technica From ACM News | October 28, 2016
Half of American adults are in a face-recognition database, according to a Georgetown University study released Tuesday.Ars Technica From ACM News | October 20, 2016
Australian neurologist Tom Oxley was on vacation in the US in November 2010 when he decided to do a bit of work.Ars Technica From ACM News | September 26, 2016
Since Edward Snowden stepped into the limelight from a hotel room in Hong Kong three years ago, use of the Tor anonymity network has grown massively.Ars Technica From ACM News | September 1, 2016
Security experts often talk about the importance of educating people about the risks of "phishing" e-mails containing links to malicious websites. But sometimes...Ars Technica From ACM News | September 1, 2016
A group called the Shadow Brokers made headlines this month by leaking a hacking tool belonging to the NSA's Tailored Access Operations (TAO) team. Now this week...Ars Technica From ACM News | August 24, 2016
The Linux operating system kernel is 25 years old this month. It was August 25, 1991 when Linus Torvalds posted his famous message announcing the project, claiming...Ars Technica From ACM News | August 23, 2016
Researchers have devised a new way to siphon data out of an infected computer even when it has been physically disconnected from the Internet to prevent the leakage...Ars Technica From ACM News | August 12, 2016
FBI Director James Comey has some phones—650 of them, to be exact—that he'd really, really like to take a look at.Ars Technica From ACM News | August 9, 2016
New data shows that the majority of robot-enabled scam phone calls came from fewer than 40 call centers, a finding that offers hope the growing menace of robocalls...Ars Technica From ACM News | August 5, 2016
Shortly after Carnegie Mellon University professor Lorrie Cranor became chief technologist at the Federal Trade Commission in January, she was surprised by an ...Ars Technica From ACM News | August 4, 2016
The Federal Bureau of Investigation has access to as many as 411.9 million images as part of its face-recognition database. Ars Technica From ACM News | June 20, 2016
There are many different schemes for making quantum computers work (most of them evil). But they pretty much all fall into two categories.Ars Technica From ACM News | June 13, 2016
The Supreme Court on Monday declined (PDF) to hear a challenge from the Authors Guild and other writers claiming Google's scanning of their books amounts to wanton...Ars Technica From ACM News | April 18, 2016