Disputed Google research is receiving further scrutiny, despite the company's inaction in open-sourcing its data or source code…
From ACM NewsGregory Goth Commissioned by CACM Staff| March 29, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
The White House is adamant the government must determine how to regulate and utilize artificial intelligence technology before it gets out of control. Wired From ACM TechNews | June 1, 2016
IBM's Watson supercomputer hardly needs any more resumé-padding. It’s already wonJeopardy, written a cookbook, and dabbled in revolutionizing healthcare. Wired From ACM News | May 13, 2016
Stingrays, a secretive law enforcement surveillance tool, are one of the most controversial technologies in the government’s spy kit.Wired From ACM News | May 9, 2016
End-to-end encryption by default is quickly becoming the new standard for any communications app that claims to care about the privacy of those who use it.Wired From ACM News | April 27, 2016
Cornell Tech researchers have shown brute-force attacks against shortened uniform resource locators can enable hackers to spread malware on victims' computers.Wired From ACM TechNews | April 19, 2016
Apple's move to encrypt your iPhone and WhatsApp's rollout of end-to-end encrypted messaging have generated plenty of privacy applause and law enforcement controversy...Wired From ACM News | April 14, 2016
For most of the past six weeks, the biggest story out of Silicon Valley was Apple's battle with the FBI over a federal order to unlock the iPhone of a mass shooter...Wired From ACM News | April 6, 2016
Until the FBI backed down from its battle with Apple over accessing the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, it seemed the agency had chosen...Wired From ACM News | April 1, 2016
Security researchers pretty much uniformly agree that letting people vote online is a very bad idea, one that is fraught with risks and vulnerabilities that could...Wired From ACM News | March 21, 2016
Three years ago, Ladar Levison, the founder of the now-defunct secure email service known as Lavabit, was in the same position Apple finds itself today: facing...Wired From ACM News | March 21, 2016
It's been eight months since a pair of security researchers proved beyond any doubt that car hacking is more than an action movie plot device when they remotely ...Wired From ACM News | March 18, 2016
You're buying a pair of jeans. At the register, instead of reaching for your wallet or phone, you pull back your hair.Wired From ACM News | March 9, 2016
It was 3:30 p.m. last December 23, and residents of the Ivano-Frankivsk region of Western Ukraine were preparing to end their workday and head home through the...Wired From ACM News | March 4, 2016
Bastille researchers warn of a new hacking technique in which malefactors armed with antennas can hijack wireless keyboards and mice from seven companies.Wired From ACM TechNews | February 25, 2016
The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...Wired From ACM News | February 19, 2016