Biometric markers are increasingly popular targets of data theft, potentially endangering far more than your locally stored information…
From ACM NewsDavid Geer Commissioned by CACM Staff| June 23, 2022
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
University of California, Irvine researchers are developing new cybersecurity methods designed to thwart botnets and other types of cyberattacks. niversity of California, Irvine From ACM TechNews | February 4, 2010
Michigan State University (MSU) researchers are developing robots that can climb walls, detect breast cancer and test protective clothing worn by soldiers. MSU State News From ACM TechNews | February 4, 2010
The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity.
Under...The Washington Post From ACM News | February 4, 2010
A fan upgrade that will save Oak Ridge National Laboratory's computing complex $150,000 a year in energy costs is just the latest step by the laboratory to reduce...Oak Ridge National Laboratory From ACM News | February 4, 2010
While some of the latest government wage data appears to show that Silicon Valley's high-tech workers are making more now than they did in 2000, a closer look at...The Wall Street Journal From ACM News | February 3, 2010
count likely knows that police can peek inside it if they have a paper search warrant.
But cybercrime investigators are frustrated by the speed of traditionalone...CNET From ACM News | February 3, 2010
The China-U.S. diplomatic spat over cyberattacks on Google has highlighted the growing significance of the Internet as a theater of combat.
Deputy Defense Secretary...Time From ACM News | February 3, 2010
Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad.
Jobs described the...Technology Review From ACM News | February 3, 2010
U.S. President Barack Obama has proposed spending $3.7 billion on science, technology, engineering, and math education in his 2011 budget, including increasing...Information Week From ACM TechNews | February 3, 2010
Britain's Women in Technology has teamed up with the National IT Learning Center to introduce the Rise of the Cyberella Competition, which will provide funding...V3.co.uk From ACM TechNews | February 3, 2010
Boston University researchers have developed a method for studying and identifying hubs within social networks. The approach emphasizes the location of the individual...Technology Review From ACM TechNews | February 3, 2010
Military agencies wanted a death ray, and they were willing to pay for it. That was one of the forces spurring scientists in a race that ended with the invention...American Institute of Physics From ACM News | February 3, 2010
Iowa investigators suspect a serious breach of a state government computer database last week originated in China. The hackers gained access to a computer system...The Des Moines Register From ACM News | February 3, 2010
Looking like a robotic mule, the Legged Squad Support System (LS3) being developed by the Defense Advanced Research Projects Agency will carry 400 pounds of equipment...Defense Industry Daily From ACM News | February 2, 2010
For a company that makes no products, Acacia Research spends a lot of time fighting over patents in court. Acacia has filed at least 337 patent-related lawsuits...BusinessWeek From ACM News | February 2, 2010
Why is the National Science Foundation helping Morehouse College pay students to test videogames? The school's Glitch Game Testers program is one of many NSF efforts...By Paul Hyman From ACM News | February 2, 2010
Painting the roofs of buildings white has the potential to significantly cool cities and mitigate some impacts of global warming, a new study indicates. The research...National Center for Atmospheric Research From ACM News | February 2, 2010
The recent hacking attack that prompted Google's threat to leave China is underscoring the heightened dangers of previously undisclosed computer security flaws...The Associated Press From ACM News | February 2, 2010
With a few quick keystrokes, a computer hacker who goes by the code name Majia calls up a screen displaying his latest victims. He operates secretly and illegally...The New York Times From ACM News | February 2, 2010
Being hacked by a robot requires much less hardware than I expected. There’s no need for virtual-reality goggles or 3D holograms. There are no skullcaps studded...Popular Mechanics From ACM News | February 1, 2010