Biometric markers are increasingly popular targets of data theft, potentially endangering far more than your locally stored information…
From ACM NewsDavid Geer Commissioned by CACM Staff| June 23, 2022
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Last week ended with a mid-level internet catastrophe. You may have noticed that for most of Friday popular sites like Netflix, Twitter, Spotify (and yes, WIRED)...Wired From ACM News | October 27, 2016
A cellphone makes a convenient detonator for an improvised explosive device. But it's also one of the most conveniently trackable devices under the eye of American...Wired From ACM News | September 19, 2016
More than six months have passed since the FBI first ordered Apple to help the agency bypass the encryption on the iPhone 5c of Rizwan Syed Farook, an ISIS supporter...Wired From ACM News | September 19, 2016
In 2013, when University of Birmingham computer scientist Flavio Garcia and a team of researchers were preparing to reveal a vulnerability that allowed them todelayed...Wired From ACM News | August 12, 2016
When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles' brakes or hijack their steering...Wired From ACM News | August 3, 2016