Despite millions of dollars in losses, iBuying's failure doesn't signal the end of tech-led disruption, just a fumbled beginning.
MIT Technology Review From ACM News | April 27, 2022
Start-up Beagle Technology addresses agricultural labor shortage and cost issues with new automated pruning technology for the wine industry.
Global Newswire From ACM News | April 26, 2022
Qing Shi and colleagues at China's Beijing Institute of Technology built a rat-inspired robot that can squeeze through tight spaces, which could be used to assess...IEEE Spectrum From ACM TechNews | April 22, 2022
Columbia University computer scientists developed an algorithm that can block smart devices from spying on users by generating extremely quiet sounds.
Columbia Engineering News From ACM TechNews | April 22, 2022
The U.S.F.L. is testing tech that could resolve disputes over where balls are spotted, clearly show if a first down was reached, and track players who stand too...The New York Times From ACM News | April 20, 2022
The inside story of the world's most notorious commercial spyware and the big tech companies waging war against it.
The New Yorker From ACM News | April 19, 2022
Researchers at New York-based cybersecurity startup Cynerio identified five zero-day vulnerabilities affecting Aethon TUG smart autonomous robots used in hospitals...The Jerusalem Post (Israel) From ACM TechNews | April 18, 2022
Symantec researchers have identified a campaign perpetrated by a hacker group associated with the Chinese government using VLC Media Player to launch a custom malware...BleepingComputer From ACM TechNews | April 14, 2022
Online employment marketplace Hired's 2022 State of Software Engineers report found mounting cyberattacks last year raised demand for security engineers.
IEEE Spectrum From ACM TechNews | April 13, 2022
Risk assessment, accountability, explainability, and bias, among other factors, challenge the success of machine learning.
Sarah Underwood Commissioned by CACM Staff From ACM News | April 12, 2022
In Ukraine in recent years, hackers entered poorly protected networks by techniques as simple as guessing passwords or intercepting their use on unsecure computers...The Conversation From ACM News | April 11, 2022
U.S. officials said the Federal Bureau of Investigation had seized control of thousands of routers and firewall appliances from Russian hackers.
Reuters From ACM TechNews | April 11, 2022
Apple recently released patches for two critical zero-day vulnerabilities discovered by an anonymous researcher that affect the operating systems of iPhones, iPads...Ars Technica From ACM TechNews | April 7, 2022
The AI algorithm could be uploaded to processors on some of China's Earth observation satellites already in orbit without any ground assistance: researchers.
South China Morning Post (Hong Kong) From ACM News | April 7, 2022
U.S. officials worked with law enforcement in the U.K., and network security company WatchGuard, to analyze the malware and develop detection and remediation tools...The Record From ACM News | April 7, 2022
Code placed in consumer-facing apps is tied to U.S. national-security contractors, documents show.
The Wall Street Journal From ACM News | April 6, 2022
University of Pennsylvania researchers have developed an approach that enables a neural network to run a code like a standard computer.
New Scientist From ACM TechNews | April 6, 2022
A pilot program launched by Exxon Mobil Corp. involves powering cryptocurrency-mining operations using excess natural gas that otherwise would be burned off from...Bloomberg From ACM TechNews | April 5, 2022
One ransomware attack struck a professional football team as competitors were preparing for the Super Bowl.
David Geer Commissioned by CACM Staff From ACM News | April 5, 2022