One of the great benefits of quantum communication is the ability to send messages from one point in space to another with perfect security.Technology Review From ACM News | June 30, 2014
A prototype device can identify someone by measuring the electrical resistance of tissues within the person's wrist. Technology Review From ACM TechNews | June 27, 2014
Private information can be obtained from encrypted communications using a technique known as traffic analysis to find patterns in the data stream. Technology Review From ACM TechNews | June 25, 2014
Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers...Technology Review From ACM Opinion | May 23, 2014
In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...Technology Review From ACM News | May 16, 2014
Researchers say they have developed a method to camouflage messages in a way that is mathematically guaranteed.Technology Review From ACM TechNews | May 13, 2014
Computer security experts have discovered a method of uniquely identifying a computer by the way it accesses Wi-Fi resources. Technology Review From ACM TechNews | May 9, 2014
Most industrial robots are far less friendly than the Roomba robot vacuum cleaner, which is safe enough to be a surprisingly popular means of feline transportation...MIT Technology Review From ACM News | April 28, 2014
The Moscow-based computer security firm Kaspersky Lab has analyzed major new kinds of malware, including Stuxnet, which four years ago was revealed to have damaged...Technology Review From ACM Opinion | April 11, 2014
Researchers have developed technology, known as a digital monkey, that can detect and counter fraudulent advertisements on a large scale. Technology Review From ACM TechNews | April 2, 2014
Anyone with an iPhone 5 can use its fingerprint reader to unlock the device and pay for apps or music in Apple's iTunes store.Technology Review From ACM News | April 2, 2014
Asked whether two unfamiliar photos of faces show the same person, a human being will get it right 97.53 percent of the time.Technology Review From ACM News | March 18, 2014
One of the common myths about the Internet is that it was originally designed during the Cold War to survive nuclear attack.Technology Review From ACM News | March 7, 2014
Bitcoin, a purely digital currency, is backed by no commodity and governed by no central bank, but it exists because a small number of humans have chosen to believe...Technology Review From ACM News | February 24, 2014
Researchers have developed an approach to cryptography that makes it difficult for hackers to determine when they have correctly deciphered a password.Technology Review From ACM TechNews | February 3, 2014
Ari Juels, an independent researcher who was previously chief scientist at computer security company RSA, thinks something important is missing from the cryptography...Technology Review From ACM News | January 31, 2014
PlaceAvoider is software that uses computer-vision techniques to identify potentially confidential or embarrassing pictures taken with new devices such as Google...Technology Review From ACM TechNews | January 30, 2014