Automated code or bots currently account for 56 percent of all of website visits, and a recent analysis of 20,000 websites found bot traffic can run as high as...Wired News From ACM TechNews | December 23, 2014
Diogo Mónica once wrote a short computer script that gave him a secret weapon in the war for San Francisco dinner reservations.Wired From ACM News | December 18, 2014
What do you get when you ask a bunch of digital artists to dream up a state-of-the-art tool for fighting cybercrime?Wired From ACM News | December 11, 2014
When Alan Turing first conceived of the Turing Test in 1947, he suggested that a computer program’s resemblance to a human mind could be gauged by making it answer...Wired From ACM News | December 3, 2014
It's been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference...Wired From ACM News | October 2, 2014
Whistleblower Edward Snowden claims the U.S. National Security Agency is developing an autonomous cyberdefense system.Wired News From ACM TechNews | August 15, 2014
Def Con is one of the world's biggest hacker conventions, an annual gathering of security experts, cryptographers and at least a few people who could surreptitiously...Wired From ACM Careers | August 8, 2014
At this week’s Black Hat security conference, security researchers will present a new proof-of-concept malware that exploits a fundamental flaw in the USB format...Wired News From ACM TechNews | August 4, 2014
Sockpuppetry—using false identities for deception—is centuries old, but the advent of the web has made creating sockpuppets, and falling for their tricks, easier...Wired From ACM Opinion | July 30, 2014
Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing...Wired From ACM News | July 24, 2014
Washington DC-area residents with a hankering for lion meat lost a valuable source of the (yes, legal) delicacy last year when a restaurant called the Serbian Crown...Wired From ACM Careers | July 11, 2014
A study of tools used by law enforcment and intelligence agencies to conduct surveillance on computer and mobile phone users revealed a wide range of functions. ...Wired News From ACM TechNews | June 30, 2014
Newly developed software uses video from wearable devices such as Google Glass and smartwatches to read PIN codes typed onto an iPad from almost 10 feet away.Wired News From ACM TechNews | June 25, 2014