Daniel A. Spielman and colleague Shang-hua Teng solved the mystery of the Simplex Method using a technique called smoothed analysis…
From ACM NewsAllyn Jackson Commissioned by CACM Staff| January 31, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Cisco has advised enterprise users of its wireless virtual private network and firewall routers to immediately install updates to patch a critical flaw.
ZDNet From ACM TechNews | March 7, 2019
Kaspersky Lab researchers revealed at Mobile World Congress 2019 in Spain that bionic hand prostheses from Moscow-based Motorica are vulnerable to hacking.
ZDNet From ACM TechNews | February 27, 2019
Security researchers attending the Pwn2Own CanSecWest security conference this March in Vancouver, Canada, will be incentivized to hack a Tesla Model 3 car.
ZDNet From ACM TechNews | January 22, 2019
The World Economic Forum has listed large-scale cyberattacks and massive data breaches among the five most probable risks facing the world today.
ZDNet From ACM TechNews | January 18, 2019
Hyundai Motor has developed a system that will allow drivers to unlock and start their vehicles using only their fingerprints.
ZDNet From ACM TechNews | December 20, 2018
Researchers have found vulnerabilities in some solid-state drives that allow hackers to circumvent encryption and access local data without knowing the password...ZDNet From ACM TechNews | November 12, 2018
Researchers discovered a new vulnerability in Intel processors that can allow attackers to leak encrypted data from the internal process of a central processing...ZDNet From ACM TechNews | November 9, 2018
The Chinese government turned to a local ISP for intelligence gathering after it signed the Obama-Xi cyberpact in late 2015, the researchers say.
ZDNet From ACM News | October 29, 2018
A new system can more effectively protect modern PC architectures against vulnerabilities exploited by malware like Meltdown and Spectre, researchers say.
ZDNet From ACM TechNews | October 25, 2018
At its core, cyberwarfare refers the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant...ZDNet From ACM Opinion | September 7, 2018
Researchers from the Xi'an Jiaotong-Liverpool University in China have developed an authentication method that uses semantically linked images.
ZDNet From ACM TechNews | July 20, 2018
A coalition of Silicon Valley tech giants has doubled down on its criticism of encryption backdoors following a proposal that would give law enforcement access...ZDNet From ACM News | May 4, 2018
Distributed Denial of Service attackers have found a new way of magnifying their attacks, with experts warning that bigger attacks are likely.
ZDNet From ACM News | March 1, 2018
Researchers have developed a method to block background "chatter," which they say solves a common problem associated with quantum sensing devices.
ZDnet From ACM TechNews | December 20, 2017
Google researchers have developed an "electronic screen protector" application that can immediately spot people glancing at a user's handheld screen.
ZDNet From ACM TechNews | November 28, 2017
Researchers have developed a simulator employing convolutional neural networks and deep learning to enhance how vehicle artificial intelligence systems manage environmental...ZDNet From ACM TechNews | January 9, 2017
Researchers are looking into the construction of new quantum-proof cryptography ito thwart quantum-based schemes future hackers could use to crack sensitive data...ZDNet From ACM TechNews | August 8, 2016
The director of the Defense Science and Technology Group's Cyber and Electronic Warfare Division recommends a big-science approach to cybersecurity in Australia...ZDNet From ACM TechNews | April 20, 2016