A gang of shadowy hackers tears through the systems of big-box retailers, making off with millions of credit and debit card numbers in a matter of weeks and generating...Wired From ACM News | January 21, 2014
The malicious program used to compromise Target and other companies was part of a widespread operation using a Trojan tool known as Trojan.POSRAM, according to...Wired From ACM News | January 17, 2014
Miguel Freitas is building a decentralized social network called Twister, which no single entity should be able to shut down. Wired News From ACM TechNews | January 15, 2014
You step inside Walmart and your shopping list is transformed into a personalized map, showing you the deals that'll appeal to you most.Wired From ACM News | December 17, 2013
In 2008, two security researchers at the DefCon hacker conference demonstrated a massive security vulnerability in the worldwide internet traffic-routing system—a...Wired From ACM News | December 6, 2013
An appellate court has finally supplied an answer to an open question left dangling by the Supreme Court in 2012: Do law enforcement agencies need a probable-cause...Wired From ACM News | October 24, 2013
Robots armed with automatic weapons, anti-tank missiles and even grenade launchers are marching, er, rolling ever closer to the battlefield now that they’ve shown...Wired From ACM News | October 21, 2013
If you liked 1960s Star Trek, the first non-Trek title that Netflix is likely to suggest to you is the original Mission: Impossible series (the one with the cool...Wired From ACM News | August 9, 2013
For the first time, encryption is thwarting government surveillance efforts through court-approved wiretaps, U.S. officials said Friday.Wired From ACM News | July 1, 2013
Looking down from 500 miles above Earth's surface, you could watch the FedEx Custom Critical Delivery truck move across the country along 3,140 miles of highway...Wired From ACM News | June 26, 2013
Ram Sriharsha works in the engine room powering one of Silicon Valley's most influential companies. He’s an engineer at Yahoo.Wired From ACM News | June 25, 2013
It took eight years after artist Jim Sanborn unveiled his cryptographic sculpture at the CIA's headquarters for someone to succeed at cracking Kryptos's enigmatic...Wired From ACM News | June 14, 2013
Quantum cryptography can theoretically encrypt a message in a way that can't be hacked, but even quantum cryptography systems can fail. Wired News From ACM TechNews | June 12, 2013
In 2008 U.S. troops in Iraq discovered that Shi’ite insurgents had figured out how to tap and record video feeds from overhead American drones. Now you too can...Wired From ACM News | June 10, 2013
A new program called Plan X is designed to facilitate cyberwarfare executed in a manner similar to playing a video game. Wired News From ACM TechNews | June 5, 2013