The U.S. National Institute of Standards and Technology says there are 15 contenders remaining in its competition to develop quantum-proof encryption, down from...MIT Technology Review From ACM TechNews | August 6, 2020
Researchers at enterprise device security company Eclypsium reported a buffer-flow flaw during booting that could potentially compromise billions of Linux and Windows...Federal Computer Week From ACM TechNews | August 5, 2020
The European Union has announced sanctions against the Russian military intelligence service, and North Korean and Chinese companies, for alleged cyberattacks.
...Reuters From ACM TechNews | August 4, 2020
A national mentoring program in Israel aims to encourage girls currently enrolled in technologically oriented classes in school to pursue positions in the field...The Jerusalem Post From ACM TechNews | August 3, 2020
Researchers at the University of Chicago want you to be able to post selfies without worrying that the next Clearview AI will use them to identify you.
The New York Times From ACM News | August 4, 2020
The U.S. National Institute of Standards and Technology initiated the third round of reviewing algorithms submitted to form the core of the first post-quantum cryptography...National Institute of Standards and Technology From ACM TechNews | July 28, 2020
Chinese security researchers from Tencent's Xuanwu Lab said they can corrupt the firmware of fast chargers to cause damage to the items they charge.
The BadPower...ZDNet From ACM TechNews | July 27, 2020
Despite Google's promise that its smartphone software does not track user locations, governments were surprised to learn location-setting must be active for the...The New York Times From ACM TechNews | July 27, 2020
FThe autonomous vehicle industry is refocusing on more-profitable opportunities after efforts to commercialize robotaxis failed to live up to the hype.
Financial Times From ACM TechNews | July 24, 2020
Motion pictures are using new techniques in computer-generated imagery to create feature-length performances by convincingly "de-aged" actors.
Don Monroe From Communications of the ACM | August 1, 2020
The researchers hope software engineers will be able to build on their work to create a real-time monitoring system for exposing foreign influence in American politics...Princeton School of Public and International Affairs From ACM News | July 23, 2020
Some government agencies that use the software said they were surprised Google may pick up the locations of certain app users. Others said they had unsuccessfully...The New York Times From ACM News | July 21, 2020
A growing number of researchers are focusing on being more proactive in predicting and preventing cyberattacks, rather than reactively fixing problems later.
Sandrine Ceurstemont From ACM News | July 21, 2020
A student at the U.K.'s University of Birmingham has been unmasked as fictional by state-of-the-art forensic analysis programs from Israel-based startup Cyabra....Reuters From ACM TechNews | July 20, 2020