
Navy Mulls New Way to Enhance, Hide Submarine Communications
Deep Siren technology would let submarines communicate with ships and shore without compromising stealth
Computers, databases and networks have connected us like never before, but at what cost?

Navy Mulls New Way to Enhance, Hide Submarine Communications
Deep Siren technology would let submarines communicate with ships and shore without compromising stealth

Mac Attack Targets Porn Surfers
Does a scheme for stealing personal information from Mac OS X users mean that a few bad Apples are about to spoil the bunch?

China's Cyber Attacks Signal New Battlefield Is Online
Although a cyber war has yet to be declared, there have been plenty of online skirmishes

iPhone Hacks Annoy AT&T but Are Unlikely to Bruise Apple
Efforts to untie AT&T's exclusive service-provider agreement with Apple's iPhone are an interesting exercise to prove it can be done. But how many iPhone customers will take advantage of this?

Is Privacy Dead? Technological Approaches to the Technological Threat
In this episode Carnegie Mellon University computer scientist Latanya Sweeney talks about the changes in privacy due to data collection and approaches to protect privacy in the future, with Scientific American contributor Chip Walter. Plus we'll test your knowledge of some recent science in the news. Websites mentioned in this episode include privacy.cs.cmu.edu; www.chipwalter.com

Sounds of Typing Give Messages Away