U.S. politicians have long threatened America's enemies with tanks, planes, submarines, and nuclear missiles. Last week defense secretary Ashton Carter leveled...Technology Review From ACM News | March 7, 2016
Rather than painstakingly typing in passwords on your smartphone, you may eventually just swipe a shape or other pattern on its display to authenticate yourself...Technology Review From ACM News | March 4, 2016
On Friday, January 8, several high-level officials from the Obama administration—including the attorney general, the White House chief of staff, and the directors...Technology Review From ACM Careers | February 24, 2016
Symantec researchers recently found requiring numbers and uppercase characters in passwords does not do much to make them stronger. Technology Review From ACM TechNews | October 22, 2015
It may not look like much at first glance, but a map created by University of Wisconsin computer science professor Paul Barford and about a dozen colleagues took...Technology Review From ACM News | September 15, 2015
The ultimate nightmare for critics of the Iran nuclear deal being debated in Congress is that somehow, despite the agreement and all its built-in safeguards, Iran...Technology Review From ACM News | September 11, 2015
Programs that can confirm data and hold or use funds could help enable an insidious dimension of cryptocurrency's criminalization, according to newly released research...Technology Review From ACM TechNews | August 17, 2015
Microsoft researchers consider it vital for encryption upgrades to be developed now, to anticipate quantum computing's decryption potential.Technology Review From ACM TechNews | August 6, 2015
An open letter calling for a ban on lethal weapons controlled by artificially intelligent machines was signed last week by thousands of scientists and technologists...Technology Review From ACM News | August 4, 2015
Imagine you slack off at work and read up online about the latest Gibson 1959 Les Paul electric guitar replica.Technology Review From ACM News | July 2, 2015
There are simple steps that can be taken to make software more secure and resilient, writes Carnegie Mellon University professor Jean Yang. Technology Review From ACM TechNews | June 23, 2015
Before you read this story, try to answer the following question: Who was the first person to text you today?Technology Review From ACM News | April 29, 2015
University of Washington in Seattle researchers are studying the issues associated with the communications technology involved in telesurgery. Technology Review From ACM TechNews | April 28, 2015
The White House and U.S. Department of Homeland Security officials support arguments by the nation’s law enforcement and intelligence leaders that encryption technology...Technology Review From ACM News | April 23, 2015
Back in the 1880s, the American astronomer Simon Newcomb noticed something strange about the book of logarithmic tables in his library—the earlier pages were much...Technology Review From ACM News | April 22, 2015