Facebook has become the advertising outlet of choice for many of the world’s businesses and companies.Technology Review From ACM News | September 22, 2014
Connecting a new home appliance to a personal Wi-Fi network or broadband modem could increase the risk that data will be taken from other computers in the house...Technology Review From ACM TechNews | September 8, 2014
Punk bands from Blondie to the Ramones once played in Broadway Studios, an age-worn 95-year-old neoclassical building surrounded by strip clubs in San Francisco’s...Technology Review From ACM News | August 22, 2014
New technology could enable law enforcement to identify people whose actions justify investigation and demonstrate probable cause via an authorized electronic...Technology Review From ACM TechNews | August 20, 2014
A study of malware operating on corporate and government networks suggests that the communication patterns of these programs could warn of major conflicts.Technology Review From ACM News | August 11, 2014
Researchers have uncovered Duqu, an unusual form of steganography-based malware that embeds itself in Microsoft Windows machines.Technology Review From ACM TechNews | July 22, 2014
Pro-Russian separatists may have shot down Malaysia Airlines Flight 17 over eastern Ukraine on Thursday because they mistook the civilian plane for something else...Technology Review From ACM News | July 21, 2014
New software could give people more control over how their personal health information is shared between doctors and medical institutions. Technology Review From ACM TechNews | July 9, 2014
Researchers have developed machine-learning software that can identify crowdturfing, a term for falsifying one's popularity on social media sites. Technology Review From ACM TechNews | July 3, 2014
One of the great benefits of quantum communication is the ability to send messages from one point in space to another with perfect security.Technology Review From ACM News | June 30, 2014
A prototype device can identify someone by measuring the electrical resistance of tissues within the person's wrist. Technology Review From ACM TechNews | June 27, 2014
Private information can be obtained from encrypted communications using a technique known as traffic analysis to find patterns in the data stream. Technology Review From ACM TechNews | June 25, 2014
Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers...Technology Review From ACM Opinion | May 23, 2014
In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...Technology Review From ACM News | May 16, 2014
Researchers say they have developed a method to camouflage messages in a way that is mathematically guaranteed.Technology Review From ACM TechNews | May 13, 2014
Computer security experts have discovered a method of uniquely identifying a computer by the way it accesses Wi-Fi resources. Technology Review From ACM TechNews | May 9, 2014
Most industrial robots are far less friendly than the Roomba robot vacuum cleaner, which is safe enough to be a surprisingly popular means of feline transportation...MIT Technology Review From ACM News | April 28, 2014
The Moscow-based computer security firm Kaspersky Lab has analyzed major new kinds of malware, including Stuxnet, which four years ago was revealed to have damaged...Technology Review From ACM Opinion | April 11, 2014