Bastille researchers warn of a new hacking technique in which malefactors armed with antennas can hijack wireless keyboards and mice from seven companies.Wired From ACM TechNews | February 25, 2016
The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...Wired From ACM News | February 19, 2016
A network surveillance and security issues expert built a miniature bulk surveillance system like the one used by the U.S. National Security Agency.Wired From ACM TechNews | February 3, 2016
It was the talk most anticipated at this year's inaugural Usenix Enigma security conference in San Francisco and one that even the other speakers were eager to...Wired From ACM News | January 29, 2016
David Chaum, who has invented many cryptographic protocols, has developed an encryption scheme for secret, anonymous communications. Wired From ACM TechNews | January 6, 2016
There was once a time when people distinguished between cyberspace, the digital world of computers and hackers, and the flesh-and-blood reality known as meatspace...Wired From ACM News | December 29, 2015
Drones are the hallmark of tech-y modern warfare, but weapons piloted from afar have been around for more than a century.
Wired From ACM News | December 16, 2015
Malvertising is when hackers buy ad space on a legitimate website, and, as the name suggests, upload malicious advertisements designed to hack site visitor’s computers...Wired From ACM News | December 9, 2015
When you think about the Internet of Things, you probably think of smart refrigerators and smart electric meters, not smart pacemakers, insulin pumps, and x-ray...Wired From ACM News | November 25, 2015
In the wake of the Paris attacks, US government officials have been vocal in their condemnation of encryption, suggesting that US companies like Apple and Google...Wired From ACM News | November 20, 2015
Federal courts have long given the government leeway to surveil and collect so-called "non-content" data—records of the senders and recipients of calls and emails...Wired From ACM News | November 13, 2015
The anonymity network Tor has long been the paranoid standard for privacy online, and the Tor Browser that runs on it remains the best way to use the web while...Wired From ACM News | October 30, 2015
It's safe to assume that most people have no idea that fonts, like music or movies, are protected by intellectual property laws, they usually come with a hefty...Wired From ACM News | October 21, 2015
The chip-enabled credit card system long used in Europe, a watered down version of which is rolling out for the first time in America, is meant to create a double...Wired From ACM News | October 20, 2015
Late last week, the privacy community scored a victory in a year-long battle over the future of encryption: In internal discussions, the White House quietly overruled...Wired From ACM News | October 14, 2015