The U.S. Government Accountability Office issued a report finding the Federal Bureau of Investigation has not properly tested the accuracy of its face-matching...Technology Review From ACM TechNews | July 8, 2016
Researchers in China say they have demonstrated a form of device-independent quantum cryptography, sending a key over a distance of more than 100 kilometers at...Technology Review From ACM TechNews | June 30, 2016
The FBI has access to nearly 412 million photos in its facial recognition system—perhaps including the one on your driver's license.Technology Review From ACM News | June 28, 2016
One of the great unsung heroes of 20th century science was a mathematician and engineer at the famous Bell Laboratories in New Jersey called Claude Shannon.Technology Review From ACM News | June 8, 2016
A team at Hong Kong University of Science and Technology has conducted the first large-scale analysis of ad-block detection on the Internet. Technology Review From ACM TechNews | June 2, 2016
University of Louisville researchers are studying how malevolent artificial intelligenes might be designed, and the conditions in which they might be create.Technology Review From ACM TechNews | May 23, 2016
Researchers at Princeton University say they have conducted the largest study yet on the technology that tracks people's movements around the Web. Technology Review From ACM TechNews | May 20, 2016
The possibility that a malevolent artificial intelligence might pose a serious threat to humankind has become a hotly debated issue.Technology Review From ACM News | May 20, 2016
Researchers have hypothesized a method to measure an individual's stress levels and determine whether they are being coerced into revealing a password. Technology Review From ACM TechNews | May 17, 2016
U.S. politicians have long threatened America's enemies with tanks, planes, submarines, and nuclear missiles. Last week defense secretary Ashton Carter leveled...Technology Review From ACM News | March 7, 2016
Rather than painstakingly typing in passwords on your smartphone, you may eventually just swipe a shape or other pattern on its display to authenticate yourself...Technology Review From ACM News | March 4, 2016
On Friday, January 8, several high-level officials from the Obama administration—including the attorney general, the White House chief of staff, and the directors...Technology Review From ACM Careers | February 24, 2016
Symantec researchers recently found requiring numbers and uppercase characters in passwords does not do much to make them stronger. Technology Review From ACM TechNews | October 22, 2015
It may not look like much at first glance, but a map created by University of Wisconsin computer science professor Paul Barford and about a dozen colleagues took...Technology Review From ACM News | September 15, 2015
The ultimate nightmare for critics of the Iran nuclear deal being debated in Congress is that somehow, despite the agreement and all its built-in safeguards, Iran...Technology Review From ACM News | September 11, 2015
Programs that can confirm data and hold or use funds could help enable an insidious dimension of cryptocurrency's criminalization, according to newly released research...Technology Review From ACM TechNews | August 17, 2015