Twenty-five years ago U.S.-led Coalition forces launched the world’s first "space war" when they drove Iraqi troops out of Kuwait.Scientific American From ACM News | February 8, 2016
Forensic probes of cyberattacks can uncover their modus operandi and severity, but finding perpetrators is a difficult proposition. Scientific American From ACM TechNews | January 29, 2016
It must be difficult for the roughly half a billion people who visit Wikipedia every month to remember a world without the free online encyclopedia.Scientific American From ACM Opinion | January 15, 2016
After more than a year of bickering, stalling and revising, the Senate passed its most significant cybersecurity bill to date 74–21.Scientific American From ACM News | October 29, 2015
It is an inevitability that cryptographers dread: the arrival of powerful quantum computers that can break the security of the Internet. Although these devices...Scientific American From ACM News | September 9, 2015
The most secure computers in the world can't "Google" a thing—they are disconnected from the Internet and all other networks.Scientific American From ACM News | June 29, 2015
Given the amount of mobile phone traffic that cell phone towers transmit, it is no wonder law enforcement agencies target these devices as a rich source of data...Scientific American From ACM Opinion | June 25, 2015
The Pentagon has made clear in recent weeks that cyber warfare is no longer just a futuristic threat—it is now a real one.Scientific American From ACM News | May 6, 2015
Cyberattacks threaten to rise in frequency and complexity, which makes every person using modern technology a potential target. Scientific American From ACM TechNews | April 7, 2015
In February 2009 the U.S.'s Iridium 33 satellite collided with the Russian Cosmos 2251, instantly destroying both communications satellites.Scientific American From ACM News | February 17, 2015
In November 2012 a 28-year-old woman plunged 15 meters from a bedroom window to the pavement in New York City, a devastating fall that left her body broken but...Scientific American From ACM News | February 9, 2015
Details about where and when you use your credit card could help reveal your identity to data thieves—even if they don't know your name, address and other personal...Scientific American From ACM News | January 30, 2015
Unmarked Russian soldiers who seized Ukraine's Crimea region earlier this year gave every appearance of military professionals well equipped with modern body armor...Scientific American From ACM News | August 13, 2014
To protect your financial and personal data, most mobiles come with PIN-based security, biometrics or number grids that require you to retrace a particular pattern...Scientific American From ACM News | June 17, 2014
The electric grid was designed as a one-way highway, with power cascading out from big power plants to cities and towns at the end of the line.Scientific American From ACM News | May 22, 2014
At a bitcoin conference in Miami this January, Jeffrey Tucker, a laissez-faire economist and libertarian icon, made an unexpected observation.Scientific American From ACM News | April 29, 2014
When your home computer is hacked, the things at risk are your identity, finances and other digital assets.Scientific American From ACM News | April 2, 2014
When Microsoft launched its research labs in 1991, the personal computer was just beginning to blossom into a worldwide phenomenon, thanks in no small part to Windows...Scientific American From ACM Opinion | December 27, 2013