Researchers have developed technology, known as a digital monkey, that can detect and counter fraudulent advertisements on a large scale. Technology Review From ACM TechNews | April 2, 2014
Anyone with an iPhone 5 can use its fingerprint reader to unlock the device and pay for apps or music in Apple's iTunes store.Technology Review From ACM News | April 2, 2014
Asked whether two unfamiliar photos of faces show the same person, a human being will get it right 97.53 percent of the time.Technology Review From ACM News | March 18, 2014
One of the common myths about the Internet is that it was originally designed during the Cold War to survive nuclear attack.Technology Review From ACM News | March 7, 2014
Bitcoin, a purely digital currency, is backed by no commodity and governed by no central bank, but it exists because a small number of humans have chosen to believe...Technology Review From ACM News | February 24, 2014
Researchers have developed an approach to cryptography that makes it difficult for hackers to determine when they have correctly deciphered a password.Technology Review From ACM TechNews | February 3, 2014
Ari Juels, an independent researcher who was previously chief scientist at computer security company RSA, thinks something important is missing from the cryptography...Technology Review From ACM News | January 31, 2014
PlaceAvoider is software that uses computer-vision techniques to identify potentially confidential or embarrassing pictures taken with new devices such as Google...Technology Review From ACM TechNews | January 30, 2014
The recent leaks of U.S. National Security Agency (NSA) surveillance programs could inspire authoritarian governments in developing economies to boost NSA-style...Technology Review From ACM TechNews | November 15, 2013
Trying to derive a person's wants and needs—conscious or otherwise—from online browsing and buying habits has become crucial to companies of all kinds.Technology Review From ACM News | November 11, 2013
Computer hardware into which secret backdoors have been inserted by the U.S. National Security Agency and its adversaries is a tremendous security problem. Technology Review From ACM TechNews | October 10, 2013
Rice University researchers have found a solution to the potential for hacking an implanted defibrillator. Technology Review From ACM TechNews | September 24, 2013
Harvard University professor Gary King this year launched a social media site to gain firsthand experience of online censorship in China. Technology Review From ACM News | September 18, 2013
Last week, I visited the MIT computer science department looking for a very famous cryptographer.Technology Review From ACM Opinion | September 17, 2013
An analysis of the public log of Bitcoin digital currency transactions could enable law enforcement to pinpoint user identities. Technology Review From ACM TechNews | September 11, 2013