The Day the World's ATMs Stood Still--or Didn't
You're probably on tenterhooks wondering what will happen to your reliable, convenient ATM on April 8, the day Microsoft officially sticks a fork in its hugely popular Windows XP operating system...
You're probably on tenterhooks wondering what will happen to your reliable, convenient ATM on April 8, the day Microsoft officially sticks a fork in its hugely popular Windows XP operating system...
In many ways "big data" and "encryption" are antithetical. The former involves harvesting, storing and analyzing information to reveal patterns that researchers, law enforcement and industry can use to their benefit...
Today, maintaining privacy without guided assistance is an onerous task, whose initial costs are high, immediate rewards low and solutions fragile and constantly evolving.
Looking back at the surveillance all around us--from wiretapped phones to security cameras
Is online anonymity important to you? How far are you willing to go to protect your privacy? These two the key questions are examined in a report released Thursday by the Pew Research Center’s Internet & American Life Project...
The Super Bowl poses mammoth security challenges in any given year. This years championship gamethe first since last Aprils Boston Marathon bombingraises the stakes by bringing the game, which the Department of Homeland Security designates a Level One national security event, to New Jerseys MetLife Stadium...
For years, I’ve been getting e-mails from people who praise my brilliant research on terrorism and then ask me tough questions about the topic
Automatic gear shifting for safer and more efficient wheelchairs; a technique for harnessing terahertz spectroscopy; "humanized" lab mice; and cheaper, more accurate malaria testing--meet this year's crop of Lemelson-M.I.T...
Airport security breaches on and after 9/11 have led to the continual advancement of technologies such as millimeter wave imaging and backscatter scanners to prevent future tragedies
Tech Talker: Quick and Dirty Tips to Navigate the Digital World
Web and mobile phone users willingly share personal data in exchange for free stuff, but not everyone is ready to throw in the towel on privacy
Wallets, wreckage and digital coin. Before the new year appears, let's look at some of the most important technology stories Scientific American covered over the past 12 months.
Details about where and when you use your credit card could help reveal your identity to data thieves—even if they don't know your name, address and other personal information.
Questions over the best way to protect civilian aircraft from surface-launched missiles have reemerged in light of the recent Malaysia Airlines tragedy over the Ukraine.
Do you lock the door to your home when you're inside during the day? Or do you leave the door open if you are just running out for a minute?
While many provisions of the proposed agreement expire after 15 years, the dynamics of the Middle East are shifting too quickly to predict what lies in store
Many of the Web sites we visit every day are under cyber attack by malicious hackers looking to disrupt business transactions, discourage people from using a particular online service or exact payback for some real or perceived slight...
The Centers for Disease Control plans to take measures to better protect lab workers and the rest of us from dangerous biological samples
A satellite imaging company provides clear new pix of features on Earth's surface as India mulls the role played by such imagery in the deadly Mumbai attacks
A recent shift in U.S. military strategy and provocative actions by china threaten to ignite a new arms race in space. But would placing weapons in space be in anyone's national interest?...
You have free articles left.

Support our award-winning coverage of advances in science & technology.
Already a subscriber? Sign in.
