Daniel A. Spielman and colleague Shang-hua Teng solved the mystery of the Simplex Method using a technique called smoothed analysis…
From ACM NewsAllyn Jackson Commissioned by CACM Staff| January 31, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Developers can begin declaring how they use collected data, with a deadline of July 20 to complete their submissions.
Computing (U.K.) From ACM News | April 29, 2022
Ciaran Martin, founding head of the U.K.'s National Cyber Security Centre and now an Oxford University professor, called the attacks "extraordinary" in a tweet....CyberScoop From ACM News | April 29, 2022
Many cybercriminals and ransomware groups have links to Russia and don't target the nation. Now, it's being opened up.
Wired From ACM News | April 28, 2022
The latest biometric security methods place a priority on contactless identification.
Jake Widman Commissioned by CACM Staff From ACM News | April 28, 2022
The Declaration represents "a political commitment among Declaration partners to advance a positive vision for the Internet and digital technologies."
The White House From ACM News | April 28, 2022
A study by Microsoft shows that Russian cyberattacks often happened within days or even hours of missile strikes.
The New York Times From ACM News | April 28, 2022
The attack, which lasted less than 15 seconds, was launched from a botnet of approximately 6,000 unique bots and originated from 112 countries around the world....The Record From ACM News | April 28, 2022
European policymakers reached a deal on the Digital Services Act which would force Silicon Valley companies to more aggressively police harmful content on their...The Washington Post From ACM News | April 25, 2022
With demand exceeding the available workforce, more cybersecurity and risk executives are seeking candidates without degrees or traditional technology backgrounds...The Wall Street Journal From ACM TechNews | April 22, 2022
Expert witness in Lords police tech inquiry welcomes committee's findings but questions whether its recommendations.
ComputerWeekly (U.K.) From ACM News | April 22, 2022
A circuit board's power consumption can reveal malicious tampering designed to facilitate Trojan attacks to steal sensitive data or crash a device when triggered...New Scientist From ACM TechNews | April 20, 2022
A glitch that affects up to 9,000 retirees is one of the longest-lasting effects of the devastating ransomware attack that cost the district roughly $10 million... From ACM News | April 19, 2022
The hacking incident occurred in March 2022, resulting in the theft of more than $600 million in Ethereum and USDC stablecoins.
Computing (U.K.) From ACM News | April 19, 2022
Even the smallest window of opportunity for snooping cab pose a threat to the intellectual property and privacy of neural architectures.
From ACM News | April 19, 2022
The inside story of the world's most notorious commercial spyware and the big tech companies waging war against it.
The New Yorker From ACM News | April 19, 2022
Researchers at China's Zhejiang University found driverless cars could be fooled into seeing red traffic lights as green.
New Scientist From ACM TechNews | April 18, 2022
Researchers at New York-based cybersecurity startup Cynerio identified five zero-day vulnerabilities affecting Aethon TUG smart autonomous robots used in hospitals...The Jerusalem Post (Israel) From ACM TechNews | April 18, 2022
Ukraine claims to have doxed Russian troops and spies, while hacktivists are regularly leaking private information from Russian organizations.
Wired From ACM News | April 15, 2022