Autonomous warriors may dominate the battlefield of tomorrow, but even those that still require human flesh will take on a robotic sheen. That shift could start...Wired From ACM News | January 17, 2017
Between the revelations of mega-hacks of Yahoo and others, Russia's meddling in the US electoral system, and the recent spike in ransomware, it's easy to look at...Wired From ACM News | December 23, 2016
Cynthia Dwork is best known for inventing "differential privacy," a set of techniques that safeguard the privacy of individuals in a large database.
Wired From ACM News | November 28, 2016
Dystopian corporte surveillance threats today come at us from all directions. Companies offer "always-on" devices that listen for our voice commands, and marketers...Wired From ACM News | November 4, 2016
Last week ended with a mid-level internet catastrophe. You may have noticed that for most of Friday popular sites like Netflix, Twitter, Spotify (and yes, WIRED)...Wired From ACM News | October 27, 2016
Amid a seemingly incessant deluge of leaks and hacks, Washington, DC staffers have learned to imagine how even the most benign email would look a week later on...Wired From ACM News | October 18, 2016
In the burgeoning field of computer science known as machine learning, engineers often refer to the artificial intelligences they create as "black box" systems:...Wired From ACM News | October 4, 2016
Online forums and social media platforms are havens for trolls and bullies who launch campaigns of harassment can lead to the self-censorship of the people they...Wired From ACM TechNews | September 21, 2016
A cellphone makes a convenient detonator for an improvised explosive device. But it's also one of the most conveniently trackable devices under the eye of American...Wired From ACM News | September 19, 2016
More than six months have passed since the FBI first ordered Apple to help the agency bypass the encryption on the iPhone 5c of Rizwan Syed Farook, an ISIS supporter...Wired From ACM News | September 19, 2016
Google has built a half-trillion-dollar business out of divining what people want based on a few words they type into a search field.Wired From ACM News | September 9, 2016
Apple's refusal to comply with a court order to help the FBI crack an iPhone highlighted the pressure tech companies face to include backdoors in their software...Wired From ACM News | August 15, 2016
In 2013, when University of Birmingham computer scientist Flavio Garcia and a team of researchers were preparing to reveal a vulnerability that allowed them todelayed...Wired From ACM News | August 12, 2016
When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles' brakes or hijack their steering...Wired From ACM News | August 3, 2016