In the three months since Edward Snowden began his whistle-blowing campaign against the National Security Agency (NSA) the former government contractor has exposed...Scientific American From ACM News | September 23, 2013
A bill working its way through Congress is an opportunity to update an unfair, outmoded cybersecurity lawScientific American From ACM News | August 19, 2013
Since the dawn of the Web and ubiquitous free e-mail services over the past two decades, the need to secure personal information online has been evident but often...Scientific American From ACM News | July 15, 2013
Google has stoked our collective imagination via relentless promotion of its Google Glass wearable computer in recent months.Scientific American From ACM Opinion | May 2, 2013
Which is more intrusive: security screening and metal detectors every few blocks, or a drone flying high above it taking video of every little thing you do?Scientific American From ACM Opinion | April 18, 2013
Early attempts at driverless cars have had little difficulty gathering the loads of data required to operate autonomously.Scientific American From ACM News | April 11, 2013
As the U.S. government draws up plans to use surveillance drones in domestic airspace, opposition to what many consider an unwarranted and significant invasionprivacy...Scientific American From ACM News | March 7, 2013
The number of smartphones, tablets and other network-connected gadgets will outnumber humans by the end of the year.Scientific American From ACM Opinion | February 19, 2013
Anti-hacker defenses have long focused mainly on protecting personal computers and servers in homes and offices.Scientific American From ACM News | November 29, 2012
Earlier this year Iran's defense minister put the world on notice: His nation had developed the ability to "easily" watch spacewalking astronauts from the ground...Scientific American From ACM News | May 1, 2012
Counterfeit electronics embedded in missile guidance systems and hundred-million-dollar aircraft have become a serious problem for the U.S. military and its contractors...Scientific American From ACM News | April 20, 2012
Digital innovators Bill Joy, co-founder of Sun Microsystems, and Danny Hillis, co-founder of the Long Now Foundation, talk with Scientific American Executive Editor...Scientific American From ACM Opinion | February 24, 2012
Soon after the ill-fated Phobos-Grunt spacecraft stalled in Earth orbit, a former Russian official implicated "powerful American radars" in Alaska. Is there a...Scientific American From ACM News | December 15, 2011
Most Americans who worry about cyberwarfare are concerned that it will be directed against the United States. But the truth is that cyber conflict is far more...Scientific American From ACM News | November 21, 2011
From building-blocking bollards to millimeter-wave scanners, the September 11 terrorist attacks have led to significant changes in security techniques and technology...Scientific American From ACM News | September 9, 2011
Researchers claim to wirelessly break into automobile networks to take control of brakes and steering as the automobile industry shores up defenses.Scientific American From ACM News | April 25, 2011
In philosophy of mind, a "cerebroscope" is a fictitious device, a brain-computer interface in today's language, which reads out the content of somebody's brain...Scientific American From ACM News | April 6, 2011
The FTC is calling for "do not track" software, but one privacy and security expert said such programming would have to be incorporated into a browser for it...Scientific American From ACM News | December 6, 2010
Achieving greater efficiency and control of the electricity grid requires hooking almost every aspect of it up to the Internet, making it more vulnerable to cyber...Scientific American From ACM News | October 5, 2010