Terrorists often use masks, scarfs, and hoods to hide their identities. But a new approach aims to distinguish them using the shape of their fingers when they make the “V for victory” sign.
The director of Britain’s GCHQ intelligence agency wants to get data off encrypted devices without broadly undermining computer security.
Apple’s claims that cooperating with the FBI would reduce iPhone security are a reminder of weaknesses that already exist.
When it’s possible to record the exact movements of players in team games such as football, basketball, and so on, how can algorithms crunch this data to provide meaningful insight?
Defense secretary Ashton Carter boasts that cyber operations will help take down ISIS – opening a new era in U.S. warfare.
A selection of the most interesting and intriguing arXiv papers from the past week.
The announcement of the “Nobel Prize of computing” comes as the federal government is embroiled in a massive fight over the limits of encryption.
Measuring devices have become sensitive enough to detect the gravitational forces between tiny objects and may soon cross the quantum threshold.
Either you let law enforcement get into encrypted devices and run the risk of letting others find a similar way in, or you don’t.
Apple could unlock the San Bernardino shooter’s iPhone without creating a legal precedent that it must help investigators, a government lawyer says.