"Today we sense we are close to be being able to alter human heredity," Nobel Laureate and California Institute of Technology virologist David Baltimore said December...Scientific American From ACM News | December 3, 2015
After more than a year of bickering, stalling and revising, the Senate passed its most significant cybersecurity bill to date 74–21.Scientific American From ACM News | October 29, 2015
Mobile devices have become incredibly popular for their ability to weave modern conveniences such as Internet access and social networking into the fabric of daily...Scientific American From ACM News | August 5, 2015
The most secure computers in the world can't "Google" a thing—they are disconnected from the Internet and all other networks.Scientific American From ACM News | June 29, 2015
Given the amount of mobile phone traffic that cell phone towers transmit, it is no wonder law enforcement agencies target these devices as a rich source of data...Scientific American From ACM Opinion | June 25, 2015
The Pentagon has made clear in recent weeks that cyber warfare is no longer just a futuristic threat—it is now a real one.Scientific American From ACM News | May 6, 2015
In February 2009 the U.S.'s Iridium 33 satellite collided with the Russian Cosmos 2251, instantly destroying both communications satellites.Scientific American From ACM News | February 17, 2015
In November 2012 a 28-year-old woman plunged 15 meters from a bedroom window to the pavement in New York City, a devastating fall that left her body broken but...Scientific American From ACM News | February 9, 2015
Details about where and when you use your credit card could help reveal your identity to data thieves—even if they don't know your name, address and other personal...Scientific American From ACM News | January 30, 2015
Unmarked Russian soldiers who seized Ukraine's Crimea region earlier this year gave every appearance of military professionals well equipped with modern body armor...Scientific American From ACM News | August 13, 2014
Steady, sufficient investments in basic research are necessary to ensure the continued success of the U.S. in the future, four expert witnesses testified to Congress...Scientific American From ACM News | July 22, 2014
The electric grid was designed as a one-way highway, with power cascading out from big power plants to cities and towns at the end of the line.Scientific American From ACM News | May 22, 2014
At a bitcoin conference in Miami this January, Jeffrey Tucker, a laissez-faire economist and libertarian icon, made an unexpected observation.Scientific American From ACM News | April 29, 2014
When your home computer is hacked, the things at risk are your identity, finances and other digital assets.Scientific American From ACM News | April 2, 2014
When Microsoft launched its research labs in 1991, the personal computer was just beginning to blossom into a worldwide phenomenon, thanks in no small part to Windows...Scientific American From ACM Opinion | December 27, 2013
In the three months since Edward Snowden began his whistle-blowing campaign against the National Security Agency (NSA) the former government contractor has exposed...Scientific American From ACM News | September 23, 2013
Since the dawn of the Web and ubiquitous free e-mail services over the past two decades, the need to secure personal information online has been evident but often...Scientific American From ACM News | July 15, 2013
Which is more intrusive: security screening and metal detectors every few blocks, or a drone flying high above it taking video of every little thing you do?Scientific American From ACM Opinion | April 18, 2013