Soft robots developed by researchers at Carnegie Mellon University can transition from walking to swimming or crawling to rolling…
From ACM TechNewsCarnegie Mellon University| March 21, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
It was the talk most anticipated at this year's inaugural Usenix Enigma security conference in San Francisco and one that even the other speakers were eager to...Wired From ACM News | January 29, 2016
David Chaum, who has invented many cryptographic protocols, has developed an encryption scheme for secret, anonymous communications. Wired From ACM TechNews | January 6, 2016
There was once a time when people distinguished between cyberspace, the digital world of computers and hackers, and the flesh-and-blood reality known as meatspace...Wired From ACM News | December 29, 2015
Drones are the hallmark of tech-y modern warfare, but weapons piloted from afar have been around for more than a century.
Wired From ACM News | December 16, 2015
Malvertising is when hackers buy ad space on a legitimate website, and, as the name suggests, upload malicious advertisements designed to hack site visitor’s computers...Wired From ACM News | December 9, 2015
When you think about the Internet of Things, you probably think of smart refrigerators and smart electric meters, not smart pacemakers, insulin pumps, and x-ray...Wired From ACM News | November 25, 2015
In the wake of the Paris attacks, US government officials have been vocal in their condemnation of encryption, suggesting that US companies like Apple and Google...Wired From ACM News | November 20, 2015
Federal courts have long given the government leeway to surveil and collect so-called "non-content" data—records of the senders and recipients of calls and emails...Wired From ACM News | November 13, 2015
The anonymity network Tor has long been the paranoid standard for privacy online, and the Tor Browser that runs on it remains the best way to use the web while...Wired From ACM News | October 30, 2015
It's safe to assume that most people have no idea that fonts, like music or movies, are protected by intellectual property laws, they usually come with a hefty...Wired From ACM News | October 21, 2015
The chip-enabled credit card system long used in Europe, a watered down version of which is rolling out for the first time in America, is meant to create a double...Wired From ACM News | October 20, 2015
Late last week, the privacy community scored a victory in a year-long battle over the future of encryption: In internal discussions, the White House quietly overruled...Wired From ACM News | October 14, 2015
Over the last summer, the security research community has proven like never before that cars are vulnerable to hackers—via cellular Internet connections, intercepted...Wired From ACM News | October 1, 2015
Tomorrow is the deadline that Visa and MasterCard have set for banks and retailers across the U.S. to roll out a new system for more secure bank cards with microchips...Wired From ACM News | September 30, 2015
Cornell Tech security researchers have built a free survey alternative which they say makes it mathematically impossible for anyone to identify respondents.Wired From ACM TechNews | September 21, 2015