The elusive hacker movement known as Anonymous has carried out Internet attacks on well-known organizations like Sony and PBS. In August, the group went after its...The New York Times From ACM News | February 28, 2012
Digital innovators Bill Joy, co-founder of Sun Microsystems, and Danny Hillis, co-founder of the Long Now Foundation, talk with Scientific American Executive Editor...Scientific American From ACM Opinion | February 24, 2012
California attorney general Kamala D. Harris reached an agreement with major mobile-device companies, including Apple, Google, Amazon, Microsoft, Hewlett-Packard...Wall Street Journal From ACM TechNews | February 24, 2012
Dozens of countries are pushing aggressively for the establishment of international control over the Internet via the United Nations' International Telecommunication...Wall Street Journal From ACM TechNews | February 24, 2012
The Stockton Tunnel, excavated in 1914, lets San Francisco drivers get between downtown and Fisherman’s Wharf without having to ascend the scarily steep grades...Wired From ACM News | February 24, 2012
Large sections of the transportation and military infrastructure, some modern businesses, and computer programmers still use technology that has not been updated...PC World From ACM TechNews | February 23, 2012
Twenty-one years after he set foot in the United States, Facebook engineer Wei Zhu was overjoyed to take his oath of citizenship Wednesday at a special Silicon...San Jose Mercury News From ACM News | February 23, 2012
Alongside the news that the White House will announce voluntary privacy guidelines for Web companies comes the announcement from major online advertisers that they...The Washington Post From ACM News | February 23, 2012
There is growing evidence that information gleaned from online social networks can be processed and used in ways to gain an accurate profile of an individual.Technology Review From ACM TechNews | February 22, 2012
Tomorrow's computers will constantly improve their understanding of the data they work with, which will help them provide users with more appropriate information...IDG News Service From ACM TechNews | February 22, 2012
A dramatic shift in how robots are made and perceived is leading to their widespread adoption and use. Network World From ACM TechNews | February 22, 2012
John Nash's mind is even more exquisite than we thought. The Nobel laureate, famous for both his work in game theory and his schizophrenia—as portrayed in the book...New Scientist From ACM News | February 22, 2012
Computer programs and new mathematical algorithms are helping law enforcement agencies better predict when and where crimes will occur.Samuel Greengard From Communications of the ACM | March 1, 2012
Stanford University's experiment with online classes could help transform computer science education.
Paul Hyman From Communications of the ACM | March 1, 2012
Scientists worldwide are honored for their contributions to design, computing, science, and technology.Jack Rosenberger From Communications of the ACM | March 1, 2012
Avi Rubin is the technical director of the Information Security Institute at Johns Hopkins University, and in this talk from the TEDxMidAtlantic conference in November...ThreatPost From ACM News | February 21, 2012
A new security report warns of malware networks ("malnets") lurking within Google and other search engines, driving unsuspecting Web surfers to sites where they...MSNBC From ACM News | February 21, 2012
President Obama's fiscal 2013 budget request prioritizes basic research and development in cybersecurity at the Department of Defense, the Department of Homeland...Government Computer News From ACM TechNews | February 21, 2012
University of Central Florida computer engineers used a computer program to analyze the subunits that make up ribonucleic acid. niversity of Central Florida From ACM TechNews | February 21, 2012