Biometric markers are increasingly popular targets of data theft, potentially endangering far more than your locally stored information…
From ACM NewsDavid Geer Commissioned by CACM Staff| June 23, 2022
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Specialized techniques may make it possible to induce selective 'amnesia' in machine learning models.
Samuel Greengard From Communications of the ACM | April 1, 2022
Leading technologists and thinkers are concerned about technology's impact on our ethical thinking.
Logan Kugler From Communications of the ACM | April 1, 2022
Members of the hacker gang may act in Russia's interest, but their links to the FSB and Cozy Bear hackers appear ad hoc.
Wired From ACM News | March 18, 2022
Twitter has launched a version of its service that can circumvent Russia's attempts to block and censor the flow of information about its Ukraine invasion.
Associated Press From ACM TechNews | March 15, 2022
Ward Beullens at IBM Research Zurich in Switzerland easily cracked a cryptography algorithm touted as one of three contenders for a global standard against quantum...New Scientist From ACM TechNews | March 11, 2022
Researchers discovered seven vulnerabilities, known collectively as "Access:7," in more than 150 Internet of Things devices made by more than 100 companies.
Dark Reading From ACM TechNews | March 11, 2022
Researchers are looking to artificial intelligence as a way to potentially identify and predict problem gambling.
The New York Time From ACM TechNews | March 11, 2022
War in Ukraine and Western sanctions against Russia have made cryptocurrency a hot potato for international politics.
Wired From ACM News | March 10, 2022
The cryptocurrency boom has spawned enterprises democratically governed by a community of users. Or that's the theory. Making it work has been much mess
The New York Times From ACM News | March 10, 2022
Researchers from Lancaster University and the University of Bath use phone usage time to help identify users
Lancaster University From ACM TechNews | March 8, 2022
The online battles have blurred lines between state-backed hackers and patriotic amateurs, making it difficult for governments to understand who is attacking them...The Seattle Times From ACM News | March 7, 2022
The company is undertaking a far-reaching effort to change how it works. For some, it is an echo of their early idealism and a vision for what the Internet could...The New York Times From ACM News | March 4, 2022
Researchers at North Carolina State University and Turkey's Dokuz Eylul University have cracked next-generation homomorphic encryption via side-channel attacks....NC State University News From ACM TechNews | March 4, 2022
Investors give money to pseudonymous developers. Venture capitalists back founders without learning their real names. What happens when they need to know?
The New York Times From ACM News | March 3, 2022