In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...Technology Review From ACM News | May 16, 2014
The Moscow-based computer security firm Kaspersky Lab has analyzed major new kinds of malware, including Stuxnet, which four years ago was revealed to have damaged...Technology Review From ACM Opinion | April 11, 2014
Anyone with an iPhone 5 can use its fingerprint reader to unlock the device and pay for apps or music in Apple's iTunes store.Technology Review From ACM News | April 2, 2014
Asked whether two unfamiliar photos of faces show the same person, a human being will get it right 97.53 percent of the time.Technology Review From ACM News | March 18, 2014
Bitcoin, a purely digital currency, is backed by no commodity and governed by no central bank, but it exists because a small number of humans have chosen to believe...Technology Review From ACM News | February 24, 2014
Ari Juels, an independent researcher who was previously chief scientist at computer security company RSA, thinks something important is missing from the cryptography...Technology Review From ACM News | January 31, 2014
PlaceAvoider is software that uses computer-vision techniques to identify potentially confidential or embarrassing pictures taken with new devices such as Google...Technology Review From ACM TechNews | January 30, 2014
Eight former pro football players learned this year that they have signs of a degenerative brain disorder called chronic traumatic encephalopathy (CTE), a condition...Technology Review From ACM News | December 6, 2013
The recent leaks of U.S. National Security Agency (NSA) surveillance programs could inspire authoritarian governments in developing economies to boost NSA-style...Technology Review From ACM TechNews | November 15, 2013
Trying to derive a person's wants and needs—conscious or otherwise—from online browsing and buying habits has become crucial to companies of all kinds.Technology Review From ACM News | November 11, 2013
A silver BMW 5 Series is weaving through traffic at roughly 120 kilometers per hour (75 mph) on a freeway that cuts northeast through Bavaria between Munich and...Technology Review From ACM Opinion | October 30, 2013
Computer hardware into which secret backdoors have been inserted by the U.S. National Security Agency and its adversaries is a tremendous security problem. Technology Review From ACM TechNews | October 10, 2013
Last week, I visited the MIT computer science department looking for a very famous cryptographer.Technology Review From ACM Opinion | September 17, 2013