A new effort to ensure that the government can gain back-door access to encrypted messages could thwart one of the most promising applications of physics for...Scientific American From ACM News | October 4, 2010
By highlighting the limits of traditional military technology, the drawn-out conflicts in Iraq and Afghanistan have spurred the U.S. defense department to shake...Scientific American From ACM News | April 14, 2010
More than a year after being launched by hackers on a campaign to infect computers running Microsoft Windows, the Conficker worm's effects are still being felt....Scientific American From ACM News | February 4, 2010
Even the best electronic security may not be enough to protect sensitive data from dogged hackers, and researchers have been able to extract information from the...Scientific American From ACM TechNews | May 6, 2009