Apple's refusal to comply with a court order to help the FBI crack an iPhone highlighted the pressure tech companies face to include backdoors in their software...Wired From ACM News | August 15, 2016
In 2013, when University of Birmingham computer scientist Flavio Garcia and a team of researchers were preparing to reveal a vulnerability that allowed them todelayed...Wired From ACM News | August 12, 2016
When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles' brakes or hijack their steering...Wired From ACM News | August 3, 2016
This week, GOP presidential candidate Donald Trump openly speculated that this election would be "rigged." Last month, Russia decided to take an active role in...Wired From ACM News | August 2, 2016
When Edward Snowden met with reporters in a Hong Kong hotel room to spill the NSA's secrets, he famously asked them put their phones in the fridge to block any...Wired From ACM News | July 21, 2016
Microsoft pulled the strings. At least, that’s what Google and so many business and tech journalists said when the search giant first faced antitrust complaints...Wired From ACM News | July 15, 2016
Car-hacking demonstrations tend to get all the glory in the security research community—remotely paralyzing a Jeep on the highway or cutting a Corvette’s brakes...Wired From ACM News | July 14, 2016
In the age of big data analytics, the proprietary algorithms web sites use to determine what data to display to visitors have the potential to illegally discriminate...Wired From ACM News | June 29, 2016
If you follow the ongoing creation of self-driving cars, then you probably know about the classic thought experiment called the Trolley Problem.Wired From ACM News | June 9, 2016
Security flaws in software can be tough to find. Purposefully planted ones—hidden backdoors created by spies or saboteurs—are often even stealthier.Wired From ACM News | June 1, 2016
The White House is adamant the government must determine how to regulate and utilize artificial intelligence technology before it gets out of control. Wired From ACM TechNews | June 1, 2016
The legal battle between Oracle and Google is about to come to an end, and nothing less is as stake than the future of programming.Wired From ACM News | May 24, 2016
Stingrays, a secretive law enforcement surveillance tool, are one of the most controversial technologies in the government’s spy kit.Wired From ACM News | May 9, 2016
End-to-end encryption by default is quickly becoming the new standard for any communications app that claims to care about the privacy of those who use it.Wired From ACM News | April 27, 2016
Cornell Tech researchers have shown brute-force attacks against shortened uniform resource locators can enable hackers to spread malware on victims' computers.Wired From ACM TechNews | April 19, 2016
Apple's move to encrypt your iPhone and WhatsApp's rollout of end-to-end encrypted messaging have generated plenty of privacy applause and law enforcement controversy...Wired From ACM News | April 14, 2016