Some of the U.S.'s most prestigious cybersecurity university programs make a point of teaching their students offensive skills, but in doing so also must address...The Washington Post From ACM TechNews | October 8, 2014
In the heart of Hong Kong, where the largest pro-Democracy protest to challenge Beijing since the 1989 Tiananmen Square gathering has been brewing, some protesters...The Washington Post From ACM News | October 7, 2014
A decade ago, a group of Johns Hopkins University grad students tried to hack one of the first commercially popular Near Field Communication payment systems—the...The Washington Post From ACM News | September 11, 2014
Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they...The Washington Post From ACM News | August 26, 2014
A little over a decade ago, federal prosecutors used keystroke logging software to steal the encryption password of an alleged New Jersey mobster, Nicodemo Scarfo...The Washington Post From ACM News | July 30, 2014
The Washington Post has published an analysis of about 22,000 surveillance reports collected by the U.S. National Security Agency between 2009 and 2012.The Washington Post From ACM TechNews | July 7, 2014
An Irish judge has rendered a preliminary judgment that may have sweeping consequences for U.S. e-commerce firms.The Washington Post From ACM Opinion | June 25, 2014
The Federal Communications Commission is working to expand its role among federal agencies charged with protecting U.S. networks from cyberattacks. The Washington Post From ACM TechNews | June 13, 2014
Self-driving cars have an undeniable allure: Think of all the fun things you could do if you didn't have to keep your eyes on the road!The Washington Post From ACM News | May 13, 2014
Judges at the lowest levels of the federal judiciary are balking at sweeping requests by law enforcement officials for cellphone and other sensitive personal data...The Washington Post From ACM News | April 25, 2014
In May 2012, the law school at George Mason University hosted a forum billed as a "vibrant discussion" about Internet search competition.The Washington Post From ACM News | April 14, 2014
In 2012, the Obama administration appealed to 120 nations to help block a wide-ranging cyberattack campaign against U.S. banks The Washington Post From ACM TechNews | April 14, 2014
Since Turkish Prime Minister Recep Tayyip Erdogan implemented a ban on Twitter late last week, Tor usage in the country has surged—with connections nearly doubling...The Washington Post From ACM News | March 24, 2014
After years of focusing on outside threats, the federal government and its contractors are turning inward, aiming a range of new technologies and counterintelligence...The Washington Post From ACM News | March 10, 2014
On Friday, what had been the world's leading Bitcoin exchange declared bankrutpcy, claiming that hackers had exploited a technical issue called "transaction malleability...The Washington Post From ACM Opinion | March 3, 2014