Editor in Chief Mariette DiChristina introduces the August 2013 issue of Scientific American
Stories of high-profile attacks on Internet-connected mobile devices are hard to come by, but it may not always be this way
Researcher warns that such cards may be vulnerable to malware infection and surveillance
Technology is remaking every aspect of education, bringing top-notch courses to the world's poorest citizens and reshaping the way all students learn
To avoid being the target of big-data snooping, run your own e-mail server
Microsoft General Counsel Brad Smith says Microsoft asked the Justice Department to let it divulge more information to clear its name -- but was rebuffed last week
There are effective ways to encrypt data, whether it is in transit or in storage, but if that data is left in the clear at any point along its path, it is vulnerable to theft or tampering...
Apple will investigate the cause of a Chinese woman's death, the company confirmed to Reuters on Monday
A prolific inventor argues that we are on the cusp of an explosion in truly useful and unencumbering wearable devices
Let your smartphone to decode the world for you
Tech Talker: Quick and Dirty Tips to Navigate the Digital World
One Congressman is "disappointed" in Google's response to privacy concerns
Need to turn up your air conditioner or turn down your TV? Just swing your arm through the air
Different-shaped beams could be used to increase fiber-optic capacity, thereby easing online congestion
CEO Dick Costolo says companies should report when governments ask them for user data
How the dream of a perfectly cognizant computer continues to break our hearts
Spammers deploy malware to hijack unwary machines and use them as purveyors of junk messaging. Read this last installment about how the history of the Internet coincides with the history of spam...
Porous barriers to various forms of electronic intrusion are traversed by either menial human labor or automated botnets. Read about this carnival of oddities in the third excerpt of a chapter on the riveting history of spam...
A metadata expert reveals the sobering implications of personal data collection by governments and companies
Software filters required that spammers get devious. Learn in this new segment about using great works of literature to circumvent the intricate filtering schemes of the best software engineers...