Friending someone on Facebook makes an association public, but many relationships are never professed online.New Scientist From ACM News | May 24, 2012
Hopes that a new breed of commercial drones can be easily integrated into civilian airspace have been dashed after it was revealed that the loss of the technology...New Scientist From ACM News | May 22, 2012
In The Matrix, the famous "bullet time" effect showed how Keanu Reeves's character Neo was able to sway out of the path of incoming bullets, as time appeared to...New Scientist From ACM News | May 1, 2012
John Nash's mind is even more exquisite than we thought. The Nobel laureate, famous for both his work in game theory and his schizophrenia—as portrayed in the book...New Scientist From ACM News | February 22, 2012
When you read this sentence to yourself, it's likely that you hear the words in your head. Now, in what amounts to technological telepathy, others are on the verge...New Scientist From ACM News | February 1, 2012
Researchers have developed a system designed to rate passwords relative to those already stored in a Web site's database. The password checker can tell users if...New Scientist From ACM TechNews | February 1, 2012
People trying to cheat in casinos may soon be taking more of a gamble than they realise. Grosvenor Casinos, a major UK chain, is assessing software that can spot...New Scientist From ACM News | November 4, 2011
Submarines must be able to talk securely with remote naval bases while remaining submerged. Could quantum communications allow them to pull off this technically...New Scientist From ACM News | November 1, 2011
Norwegian University of Science and Technology researcher Vadim Makarov has developed a quantum cryptography method to defend against attacks of quantum key distribution...New Scientist From ACM TechNews | October 27, 2011
Automatic Dependent Surveillance-Broadcast (ADS-B) technology uses unencrypted global positioning system signals to broadcast a plane's position to networks. The...New Scientist From ACM TechNews | September 15, 2011
Arizona State University researcher Pritam Gundecha has developed a method for determining which Facebook friends are most likely to leak private information. New Scientist From ACM TechNews | August 31, 2011
More than 113 million Internet users were redirected to malicious pages due to search engine poisoning in May 2011, according to Trend Micro. New Scientist From ACM TechNews | August 30, 2011
The response was as aggressive and swift as the riots themselves. Within a few hours of the worst of the looting across London and other English cities, attempts...New Scientist From ACM News | August 22, 2011
Super-stealthy submarines may one day glide through the water without creating a wake, if a plan to channel fluid intelligently around objects can be made to...New Scientist From ACM News | August 1, 2011
People who use Bitcoin to ensure their purchases remain anonymous may want to reconsider their reliance on the online peer-to-peer currency, say researchers who...New Scientist From ACM News | July 26, 2011
Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?New Scientist From ACM News | July 21, 2011
It was early May when LulzSec's profile skyrocketed after a hack on the giant Sony corporation. LulzSec's name comes from Lulz, a corruption of LOL, often denoting...New Scientist From ACM News | July 5, 2011
University of Southern California scientists have developed a machine-translation technique that treats translation as a cryptographic challenge rather than a matter...New Scientist From ACM TechNews | June 24, 2011
Delft University researchers are studying how botclouds can be used to launch attacks, send spam, and commit fraud. New Scientist From ACM TechNews | June 23, 2011