Vector databases, commonly used for similarity search and product recommendations, are a shining light in the era of Artificial…
From ACM NewsEsther Shein Commissioned by CACM Staff| June 8, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Advanced artificial intelligence systems developed to defend assets in cyberspace might be turned to malevolent purposes by cybercriminals.
IDG News Service From ACM TechNews | November 28, 2016
Google chief Internet evangelist and former ACM president Vint Cerf said he would change a few things about the Internet's creation if he could do it over again...IDG News Service From ACM TechNews | September 26, 2016
The U.S. National Science Foundation will invest more than $400 million over the next seven years to fund next-generation wireless research. IDG News Service From ACM TechNews | July 18, 2016
The European Union is contributing $500 million to fund research into cybersecurity, and is asking the private sector to contribute an additional $1.5 billion. IDG News Service From ACM TechNews | July 8, 2016
A Tor Project developer reports the project is enhancing its software to rapidly detect tampering to its network for the purpose of surveillance. IDG News Service From ACM TechNews | March 24, 2016
Massachusetts Institute of Technology researchers have developed a predictive tool that could give ships a two- to three-minute advance warning of approaching rogue...IDG News Service From ACM TechNews | February 26, 2016
Researchers have found thousands of mobile applications implement cloud-based, back-end services in a way that lets anyone access sensitive records created by users...IDG News Service From ACM TechNews | November 19, 2015
Engineers at Xerox PARC have developed a chip that can self-destruct upon command, making it potentially suitable for high-security applications. IDG News Service From ACM TechNews | September 14, 2015
Many types of databases used for electronic medical records are vulnerable to leaking information, according to a new study from Microsoft researchers. IDG News Service From ACM TechNews | September 8, 2015
ACM A.M. Turing Award recipient Manuel Blum believes online passwords can be made more secure by creating what he calls "human computable" passwords. IDG News Service From ACM TechNews | September 2, 2015
Many of the world's top computer science experts met last week to determine how the widespread collection of data about consumers can be prevented from causing...IDG News Service From ACM TechNews | August 31, 2015
Google chief Internet evangelist Vint Cerf says he finds certain aspects of the Internet of Things particularly worrisome. IDG News Service From ACM TechNews | August 26, 2015
Online voting systems lack sufficient security to ensure accurate vote counts, but election officials could take steps to improve their security and transparency...IDG News Service From ACM TechNews | July 13, 2015
Researchers from Tel Aviv University have developed an easily concealable device that can deduce encryption keys by sniffing the electromagnetic leakage from a...IDG News Service From ACM TechNews | June 22, 2015
Researchers at Royal Holloway, University of London have found that several million Internet hosts are still vulnerable to the FREAK flaw in the SSL/TLS encryption...IDG News Service From ACM TechNews | March 18, 2015
The Core Infrastructure Initiative was formed to identify and provide extra funding to critical open source projects that need help ensuring the security of their...IDG News Service From ACM TechNews | February 17, 2015
A leading European human rights body warns mass Internet surveillance is a threat to basic human privacy rights and has not apparently prevented terrorist attacks...IDG News Service From ACM TechNews | January 28, 2015
Fujitsu researchers are integrating psychology into profiling software to make computer security more personalized. IDG News Service From ACM TechNews | January 23, 2015