Biometric markers are increasingly popular targets of data theft, potentially endangering far more than your locally stored information…
From ACM NewsDavid Geer Commissioned by CACM Staff| June 23, 2022
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
As companies increasingly allow workers to use personal smartphones and tablets on the job, they are confronting a potential new security threat: malicious software...The Wall Street Journal From ACM News | April 9, 2012
Researchers have released two new exploits that attack common design vulnerabilities in a computer component used to control critical infrastructure, such as refineries...Wired From ACM News | April 6, 2012
Google’s Project Glass has put new focus on Google X, the lab at the tech giant where engineers work to develop the next big thing.The Washington Post From ACM Careers | April 6, 2012
It is called an advanced persistent threat, and if it sounds like something out of a Tom Clancy novel, that's because it pretty much is.
The Wall Street Journal From ACM News | April 4, 2012
In her black robe and strand of white pearls, Lucy Koh projects the serious, deliberate demeanor befitting a U.S. District Court judge.Bloomberg Businessweek From ACM News | April 3, 2012
To join Facebook or not to join Facebook? You might think the decision depends on how many of your friends are already on the social-networking site.Science From ACM News | April 3, 2012
A participant in MIT's IDEAS Global Challenge is Wecyclers, a crowdsourced recycling platform that will operate in Lagos, Nigeria, and is designed to incentivize...MIT News From ACM TechNews | April 2, 2012
In a typical month, David Lawee meets two dozen founders of new companies. He grills them on their businesses, their ambitions, their funding, and their clever...Slate From ACM News | March 30, 2012
Julie Barbour-Issa calls her eight-year-old cellphone "the dinosaur. It's a brick, and I could use it as a weapon in an emergency," says the 30-year-old Norwood...The Wall Street Journal From ACM News | March 28, 2012
Mohammed Merah, the culprit of the killing of 7 people in France last week, was found using a mix of traditional and online forensics.Kings of War From ACM News | March 27, 2012
If you had to track down fugitives hidden in five cities around the world, would one day and a $5,000 reward be enough to succeed?CNET From ACM News | March 27, 2012
The supercomputer in this southern boomtown is named Nebulae for the interstellar clouds of gas that give birth to stars.The Wall Street Journal From ACM News | March 27, 2012
AT 7 years old, Gilad Elbaz wrote, "I want to be a rich mathematician and very smart." That, he figured, would help him "discover things like time machines, robots...The New York Times From ACM News | March 26, 2012
A heartbreaking, out-of-the-gate failure of Russia's sample return mission early this year created a wide circle of disappointment.Scientific American From ACM News | March 26, 2012
His saga is the entrepreneurial creation myth writ large: Steve Jobs cofounded Apple in his parents' garage in 1976, was ousted in 1985, returned to rescue it from...Harvard Business Review From ACM News | March 23, 2012
Just two years ago, cybercriminal gangs were behind record-breaking data breaches that resulted in the theft of millions of customer records. But the year 2011...Wired From ACM News | March 22, 2012