A 2018 letter from the bureau to the Israeli government is the clearest documentary evidence to date that the agency weighed using the spyware for law enforcement...The New York Times From ACM News | May 13, 2022
Brown University scientists led a multi-institutional team in employing new DNA analysis methods to better understand genetic conditions' impact across different...News from Brown From ACM TechNews | May 11, 2022
Researchers at cybersecurity software company SentinelOne reported two high-severity bugs in Avast and AVG antivirus products that have gone undetected for a decade...ZDNet From ACM TechNews | May 9, 2022
Researchers in China demonstrated the ability of an autonomous flying drone swarm to navigate a thick forest it had never before encountered.
TechCrunch From ACM TechNews | May 6, 2022
Researchers at security firm Nozomi Networks identified an unpatched vulnerability in third-party code libraries used by 200 hardware and software vendors.
Ars Technica From ACM TechNews | May 6, 2022
Scientists at Australia's Monash University have developed a computer science learning framework that uses food to teach fundamental computing concepts.
Monash University (Australia) From ACM TechNews | May 4, 2022
Researchers have developed an enhanced approach to the Traveling Salesperson Problem that yields high-quality solutions at a faster rate than other cutting-edge...University of Cambridge (U.K.) From ACM TechNews | April 27, 2022
Despite millions of dollars in losses, iBuying's failure doesn't signal the end of tech-led disruption, just a fumbled beginning.
MIT Technology Review From ACM News | April 27, 2022
Start-up Beagle Technology addresses agricultural labor shortage and cost issues with new automated pruning technology for the wine industry.
Global Newswire From ACM News | April 26, 2022
Qing Shi and colleagues at China's Beijing Institute of Technology built a rat-inspired robot that can squeeze through tight spaces, which could be used to assess...IEEE Spectrum From ACM TechNews | April 22, 2022
Columbia University computer scientists developed an algorithm that can block smart devices from spying on users by generating extremely quiet sounds.
Columbia Engineering News From ACM TechNews | April 22, 2022
The U.S.F.L. is testing tech that could resolve disputes over where balls are spotted, clearly show if a first down was reached, and track players who stand too...The New York Times From ACM News | April 20, 2022
The inside story of the world's most notorious commercial spyware and the big tech companies waging war against it.
The New Yorker From ACM News | April 19, 2022
Researchers at New York-based cybersecurity startup Cynerio identified five zero-day vulnerabilities affecting Aethon TUG smart autonomous robots used in hospitals...The Jerusalem Post (Israel) From ACM TechNews | April 18, 2022
Symantec researchers have identified a campaign perpetrated by a hacker group associated with the Chinese government using VLC Media Player to launch a custom malware...BleepingComputer From ACM TechNews | April 14, 2022
Online employment marketplace Hired's 2022 State of Software Engineers report found mounting cyberattacks last year raised demand for security engineers.
IEEE Spectrum From ACM TechNews | April 13, 2022
Risk assessment, accountability, explainability, and bias, among other factors, challenge the success of machine learning.
Sarah Underwood Commissioned by CACM Staff From ACM News | April 12, 2022
In Ukraine in recent years, hackers entered poorly protected networks by techniques as simple as guessing passwords or intercepting their use on unsecure computers...The Conversation From ACM News | April 11, 2022
U.S. officials said the Federal Bureau of Investigation had seized control of thousands of routers and firewall appliances from Russian hackers.
Reuters From ACM TechNews | April 11, 2022