China's proposed anti-terrorism law will not affect the legitimate interests of technology firms, a top Chinese spokeswoman said Wednesday after U.S. President ...Reuters From ACM Careers | March 4, 2015
China is weighing a far-reaching counterterrorism law that would require technology firms to hand over encryption keys and install security "backdoors", a potential...Reuters From ACM Careers | February 27, 2015
China had 649 million Internet users by the end of 2014, with 557 million of those using handsets to go online, said a government report on Tuesday, as the world's...Reuters From ACM News | February 3, 2015
China showed governments and the planet's biggest tech firms last week its vision for global Internet governance—clean, controlled and choreographed.Reuters From ACM News | November 25, 2014
The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that...Reuters From ACM News | October 23, 2014
The U.S. Justice Department is restructuring its national security prosecution team to deal with cyber attacks and the threat of sensitive technology ending up...Reuters From ACM News | October 22, 2014
Jonathan Mosen, who has been blind since birth, spent his evening snapping photos of packages in the mail, his son's school report and labels on bottles in the...Reuters From ACM Careers | September 23, 2014
While U.S. military leaders appeared before Congress to outline their strategy to fight Islamic State militants on the battlefield, the National Security Agency...Reuters From ACM Opinion | September 16, 2014
An Acura RLX sedan demonstrated an unusual way to tow another car this week: the vehicles were not physically attached.Reuters From ACM News | September 15, 2014
NATO leaders agreed on Friday that a large-scale cyber attack on a member country could be considered an attack on the entire U.S.-led alliance, potentially triggering...Reuters From ACM News | September 5, 2014
China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said...Reuters From ACM News | August 25, 2014
In a fast-moving war with an elusive foe like the Islamic State militants, information is as important as guns, jet fighters and bombs.Reuters From ACM Opinion | August 21, 2014
Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight...Reuters From ACM News | August 6, 2014
A highly anticipated talk on how to identify users of the Internet privacy service Tor was withdrawn from the upcoming Black Hat security conference, a spokeswoman...Reuters From ACM News | July 22, 2014
MasterCard Inc, the world's second-largest debit and credit card company, sees business booming from selling data to retailers, banks, and governments on spending...Reuters From ACM Careers | June 17, 2014
Some of the largest U.S. companies are looking to hire cybersecurity experts in newly elevated positions and bring technologists on to their boards, a sign that...Reuters From ACM Careers | May 30, 2014
The U.S. Food and Drug Administration has approved a robotic arm for amputees that is named for the "Star Wars" character Luke Skywalker and can perform multiple...Reuters From ACM News | May 12, 2014