Just when the cybersecurity world thinks it's found the limits of how far Russian hackers will go to meddle in foreign elections, a new clue emerges that suggests...Wired From ACM News | June 9, 2017
Over the past year, the Kremlin's strategy of weaponizing leaks to meddle with democracies around the world has become increasingly clear, first in the US and more...Wired From ACM News | May 26, 2017
When the cybersecurity industry warns of digital threats to the "internet of things," the targets that come to mind are ill-conceived, insecure consumer products...Wired From ACM News | May 3, 2017
On the morning of December 30, the day after Barack Obama imposed sanctions on Russia for interfering in the 2016 US election, Tillmann Werner was sitting down...Wired From ACM News | March 22, 2017
You've heard the hype: The quantum computer revolution is coming. Physicists say these devices will be fast enough to break every encryption method banks use today...Wired From ACM News | March 15, 2017
When Wikileaks yesterday released a trove of documents purporting to show how the CIA hacks everything from smartphones to PCs to smart televisions, the agency's...Wired From ACM News | March 8, 2017
A few hours after dark one evening earlier this month, a small quadcopter drone lifted off from the parking lot of Ben-Gurion University in Beersheba, Israel.
Wired From ACM News | February 23, 2017
The VUSec team at the Free University of Amsterdam in the Netherlands has demonstrated an exploit that undercuts a basic safeguard used in all modern operating...Wired From ACM TechNews | February 15, 2017
Autonomous warriors may dominate the battlefield of tomorrow, but even those that still require human flesh will take on a robotic sheen. That shift could start...Wired From ACM News | January 17, 2017
Between the revelations of mega-hacks of Yahoo and others, Russia's meddling in the US electoral system, and the recent spike in ransomware, it's easy to look at...Wired From ACM News | December 23, 2016
Cynthia Dwork is best known for inventing "differential privacy," a set of techniques that safeguard the privacy of individuals in a large database.
Wired From ACM News | November 28, 2016
Dystopian corporte surveillance threats today come at us from all directions. Companies offer "always-on" devices that listen for our voice commands, and marketers...Wired From ACM News | November 4, 2016
Last week ended with a mid-level internet catastrophe. You may have noticed that for most of Friday popular sites like Netflix, Twitter, Spotify (and yes, WIRED)...Wired From ACM News | October 27, 2016
Amid a seemingly incessant deluge of leaks and hacks, Washington, DC staffers have learned to imagine how even the most benign email would look a week later on...Wired From ACM News | October 18, 2016