Intel and a coalition of security researchers have identified a new vulnerability in Intel's chips which could permit the theft of sensitive data from central processing...Wired From ACM TechNews | May 20, 2019
Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: it satisfies both law enforcement and privacy purists.
Wired From ACM News | April 22, 2019
At the world's top computer-vision conference last June, Google and Apple sponsored an academic contest that challenged algorithms to make sense of images from...Wired From ACM News | March 13, 2019
The U.S. National Security Agency has chosen to open source the cybersecurity tool Ghidra, a reverse-engineering platform that takes "compiled" software and "decompiles"...Wired From ACM TechNews | March 11, 2019
At the endless booths of this week's RSA security trade show in San Francisco, an overflowing industry of vendors will offer any visitor an ad nauseam array of...Wired From ACM News | March 7, 2019
There's a meme on Instagram, circulated by a group called "Born Liberal." A fist holds a cluster of strings, reaching down into people with television sets for...Wired From ACM News | December 17, 2018
Last week, as thousands of Central American migrants made their way northward through Mexico, walking a treacherous route toward the US border, talk of "the caravan...Wired From ACM News | November 1, 2018
Google CEO Sundar Pichai was upbeat Monday when he told WIRED about internal tests of a censored search engine designed to win approval from Chinese officials....Wired From ACM News | October 19, 2018
Philip K. Dick was living a few miles north of San Francisco when he wrote Do Androids Dream of Electric Sheep?, which envisioned a world where artificially intelligent...Wired From ACM News | October 11, 2018
For years, the Kremlin's increasingly aggressive hackers have reached across the globe to hit targets with everything from simple phishing schemes to worms built...Wired From ACM News | October 10, 2018
When apps want to access data from your smartphone's motion or light sensors, they often make that capability clear.
Wired From ACM News | September 27, 2018
Tesla has taken plenty of innovative steps to protect the driving systems of its kitted-out cars against digital attacks. It's hired top-notch security engineers...Wired From ACM News | September 11, 2018
They call it Herb2. It's a dapper robot, wearing a bowtie even while it sits at home in its lab at the University of Washington.
Wired From ACM News | August 27, 2018