Urban Bungle: Atlanta Cyber Attack Puts Other Cities on Notice
The city has spent the past two weeks restoring online services disrupted by ransomware that held encrypted data hostage...
The city has spent the past two weeks restoring online services disrupted by ransomware that held encrypted data hostage...
While many provisions of the proposed agreement expire after 15 years, the dynamics of the Middle East are shifting too quickly to predict what lies in store
If violent criminal tendencies peak during the teen years and seldom extend to midlife, should we still lock people up and throw away the key?
Do you lock the door to your home when you're inside during the day? Or do you leave the door open if you are just running out for a minute?
For years, I’ve been getting e-mails from people who praise my brilliant research on terrorism and then ask me tough questions about the topic
Details about where and when you use your credit card could help reveal your identity to data thieves—even if they don't know your name, address and other personal information.
President Barack Obama's sixth State of the Union address, his first before a Republican-led legislature, was studded this evening with references to science and technology amidst talk of middle class tax cuts, thawing U.S...
President Barack Obama's sixth State of the Union address, his first before a Republican-led legislature, was studded this evening with references to science and technology amidst talk of middle class tax cuts, thawing U.S...
Wallets, wreckage and digital coin. Before the new year appears, let's look at some of the most important technology stories Scientific American covered over the past 12 months.
Today, maintaining privacy without guided assistance is an onerous task, whose initial costs are high, immediate rewards low and solutions fragile and constantly evolving.
Questions over the best way to protect civilian aircraft from surface-launched missiles have reemerged in light of the recent Malaysia Airlines tragedy over the Ukraine.
Web and mobile phone users willingly share personal data in exchange for free stuff, but not everyone is ready to throw in the towel on privacy
The Centers for Disease Control plans to take measures to better protect lab workers and the rest of us from dangerous biological samples
A new software technique thwarts forensic software by making indiscernible changes in a handset’s operating system
To protect your financial and personal data, most mobiles come with PIN-based security, biometrics or number grids that require you to retrace a particular pattern to access your device...
Tech Talker: Quick and Dirty Tips to Navigate the Digital World
You're probably on tenterhooks wondering what will happen to your reliable, convenient ATM on April 8, the day Microsoft officially sticks a fork in its hugely popular Windows XP operating system...
Imagine that you are a bouncer, checking IDs outside a popular bar in a college town. It is somewhat dark outside the door, there are many distractions: loud music is playing and your job requires you to also keep an eye on the crowd for trouble...
In many ways "big data" and "encryption" are antithetical. The former involves harvesting, storing and analyzing information to reveal patterns that researchers, law enforcement and industry can use to their benefit...
Many of the Web sites we visit every day are under cyber attack by malicious hackers looking to disrupt business transactions, discourage people from using a particular online service or exact payback for some real or perceived slight...
You have free articles left.
Support our award-winning coverage of advances in science & technology.
Already a subscriber? Sign in.