Early intervention is crucial to close the gender gap in computer science
Rising computerization opens doors for increasingly aggressive adversaries, but defenses are better than many might think
Computer-security methods could help scientists identify disease-causing genes—while preserving patient privacy
Former Congressman Rick Boucher talks about how Congress and electric power lines could break the federal government’s net neutrality deadlock
Some of the most talented and dangerous cybercrooks and cyberwarriors come from Russia, a longtime meddler in other countries’ affairs
Why you should think twice before you give an app access to your phone’s address book.
The products that really wow us seem like pure wizardry
Even if they can exchange their ransom, the criminals will have a hard time accessing their money anonymously
Sophisticated software could help doctors make better diagnoses
We real people should work on improving security where we are most vulnerable—on our own devices
A new device promises to tell police when a driver has been sending messages while behind the wheel, but is it legal? Larry Greenemeier reports.
Humans are increasingly entrusting our security, health and safety to “black box” intelligent machines
Celebrity Twitter accounts look a lot like Twitter bots: They tweet regularly, follow relatively few people, and upload a lot of content. Christopher Intagliata reports.
Net neutrality arguments aside, researchers pursue a faster and more reliable way to send and receive large amounts of data through the internet in times of crisis
We’re not going to stop taking pictures and recording movies, and we need to develop new ways to save them
Roborace is creating a new motorsport to accelerate the arrival of self-driving cars
Robopocalypse creator Daniel Wilson sets aside his dystopian tendencies to help the XPRIZE’s Sci-fi collection and writing contest find a silver lining in our obsession with intelligent assistants
Researchers in the U.K. trained computers to rate photos of parks and cities for what humans consider to be their scenic beauty. Christopher Intagliata reports.
Security has to start with sound itself
U.S. firms have both the incentive and the opportunity to use information about us in undesirable ways