Vector databases, commonly used for similarity search and product recommendations, are a shining light in the era of Artificial…
From ACM NewsEsther Shein Commissioned by CACM Staff| June 8, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Researchers trained an artificial intelligence-powered algorithm to identify individuals based their hand vibrations when holding a smartphone.
New Scientist From ACM TechNews | August 22, 2022
Security researcher Zachary Minneker discovered a flaw in the U.S. Department of Veterans Affairs' VistA records platform and determined that hackers easily can...Wired From ACM TechNews | August 18, 2022
Software developer Stephen Lacy identified a malicious URL in the code of an open source project on GitHub that he found through a Google search.
Bleeping Computer From ACM TechNews | August 16, 2022
Google Project Zero security researcher Ivan Fratric launched a remote code execution attack by exploiting the technology underlying Zoom and other applications...PC Magazine From ACM TechNews | August 15, 2022
Under the pilot program, campaigns would be able to circumvent algorithmic sorting by tech companies that at times sends their emails to spam.
The Washington Post From ACM News | August 12, 2022
Researchers at FortiGuard Labs reported that an Internet of Things (IoT) botnet malware identified in mid-June has been evolving rapidly.
The Hacker News From ACM TechNews | August 11, 2022
The U.S. Space Force held a demonstration of dog-like quadruped unmanned ground vehicles for patrols at Cape Canaveral.
Space.com From ACM TechNews | August 10, 2022
Stanford University researchers are exploring whether emerging foundation models can help to realize the highest level of privacy, or "perfect secrecy."
Stanford University Institute for Human-Centered Artificial Intelligence From ACM TechNews | August 9, 2022
Researchers have found the operators of the Gootkit access-as-a-service malware now are using legal documents to get unsuspecting users to download them.
The Hacker News From ACM TechNews | August 9, 2022
A number of lawyers and experts say measures to safeguard citizens online are badly needed, but the bill was criticized by both privacy advocates and tech companies...The New York Times From ACM News | August 5, 2022
The number of "cryptojacking" attacks on financial companies jumped 30% to 66.7 million during the first half of 2022 compared with the same period last year.
Bloomberg From ACM TechNews | August 4, 2022
Researchers ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.
Ars Technica From ACM TechNews | August 3, 2022
Wildfire prediction model uses social media and geophysical satellite data for more accurate real-time forecasting and monitoring.
Imperial College London From ACM TechNews | July 29, 2022