A new report warns of cybersecurity measures undermining personal rights and freedoms through censorship and other means if "multilateral" government policies continue...NextGov.com From ACM TechNews | September 25, 2017
University of Alberta professor Randy Goebel's team in Canada is working with researchers in Japan to develop artificial intelligence software for legal reasoning...CBC News (Canada) From ACM TechNews | September 25, 2017
Fully automated cars are still many years away. Amid the government activity and potential for social benefits, it's important not to lose sight of smaller improvements...The Conversation From ACM News | September 25, 2017
At one node of the industrial backbone that keeps the internet running, employees sheltered from the worst of Hurricane Irma in a stairwell of a seven-story building...The New York Times From ACM News | September 20, 2017
Researchers have devised malware that can jump airgaps by using the infrared capabilities of an infected network's surveillance cameras to transmit data to and...Ars Technica From ACM News | September 20, 2017
The days of unqualified praise from Washington are over for the country's biggest tech companies, whose size and power are increasingly drawing attacks from both...Politico From ACM Careers | September 18, 2017
Researchers at the University of Illinois have proposed a computer algorithm that could ease congressional districting and make the process fairer for constituents...Illinois News Bureau From ACM TechNews | September 18, 2017
The Equifax breach, attributed to a server flaw disclosed by Cisco researchers that went unpatched, has potentially exposed an estimated 143 million Americans'...The Wall Street Journal From ACM TechNews | September 18, 2017
For some, the spread of artificial intelligence and robotics poses a threat to our privacy, our jobs – even our safety, as more and more tasks are handed over to...BBC News From ACM News | September 15, 2017
A security analysis of two wearable fitness trackers revealed a technique for intercepting messages transmitted between the trackers and cloud servers.
University of Edinburgh From ACM TechNews | September 15, 2017
Researchers suggest controlling access to third-party libraries will help limit the undesired exposure of personal information by smartphone applications.
Carnegie Mellon News From ACM TechNews | September 15, 2017
The U.S. government on Wednesday moved to ban the use of a Russian brand of security software by federal agencies amid concerns the company has ties to state-sponsored...The Washington Post From ACM News | September 14, 2017
A whiff of dystopian creepiness has long wafted in the air whenever facial recognition has come up. Books, movies and television shows have portrayed the technology...The Washington Post From ACM News | September 13, 2017