An analysis of the public log of Bitcoin digital currency transactions could enable law enforcement to pinpoint user identities. Technology Review From ACM TechNews | September 11, 2013
A few changes to a standard phone can block calls and text messages intended for nearby users of the same GSM cellular network.Technology Review From ACM TechNews | August 28, 2013
University of Texas researchers recently tricked the navigation system of an $80 million yacht and sent the ship off course in an experiment that showed how any...Technology Review From ACM News | August 14, 2013
As a growing number of Internet-connected home appliances hit the market, David Bryan and Daniel Crowley worry that digital ne'er-do-wells will get new ways to...Technology Review From ACM News | August 13, 2013
A new system designed to catch malware on medical devices by noting subtle changes in their power consumption is designated WattsUpDoc. Technology Review From ACM TechNews | August 12, 2013
In a small, dark, room off a long hallway within a sprawling complex of buildings in Silicon Valley, an array of massive flat-panel displays and video cameras track ...Technology Review From ACM News | June 28, 2013
For those who find Google Glass indiscreet, electronic contact lenses that outfit the user’s cornea with a display may one day provide an alternative.Technology Review From ACM News | June 7, 2013
If the Internet is to reach everywhere—from the pills you swallow to the shoes on your feet—then computers will need to get a whole lot smaller.Technology Review From ACM News | May 30, 2013
Companies market to you according to your shopping habits, your age, your salary, and your social-media activities. In the future, they may be able to advertise...Technology Review From ACM News | May 24, 2013
Microsoft announced a new version of the Xbox One earlier this week, and with it an improved and essentially reinvented version of Kinect, the company's body- and...Technology Review From ACM Careers | May 23, 2013
Los Alamos National Labs has been running a quantum Internet that can transmit perfectly secure messages for more than two years. Technology Review From ACM TechNews | May 6, 2013
One day, we may be able to check email or call a friend without ever touching a screen or even speaking to a disembodied helper.Technology Review From ACM News | April 29, 2013
Wireless operators have access to an unprecedented volume of information about users' real-world activities, but for years these massive data troves were put to...Technology Review From ACM News | April 18, 2013
Google has developed rings designed to be worn on the finger that provide security for logging into a computer or an online account.Technology Review From ACM TechNews | March 15, 2013
The fact that smartphones and tablets don't need antivirus software or regular software updates is a major reason for their popularity.Technology Review From ACM News | March 12, 2013
A beige office block in Shanghai's suburbs belonging to the Chinese army became world famous on Tuesday after Mandiant, a Washington-based computer security company...Technology Review From ACM News | February 21, 2013
Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating...Technology Review From ACM News | February 14, 2013