A Tor Project developer reports the project is enhancing its software to rapidly detect tampering to its network for the purpose of surveillance. IDG News Service From ACM TechNews | March 24, 2016
Researchers at Florida State University's National High Magnetic Field Laboratory have found a way to dampen qubits' susceptibility to magnetic disruptions, or...IDG News Service From ACM TechNews | March 18, 2016
A new app identifies food poisoning-related tweets and connects them to restaurants using geotagging, in order to identify likely hotspots of food poisoning.. IDG News Service From ACM TechNews | March 11, 2016
The increasing popularity of life-like games and virtual reality technology is pushing the computing industry to develop better graphics technology. IDG News Service From ACM TechNews | March 1, 2016
Massachusetts Institute of Technology researchers have developed a predictive tool that could give ships a two- to three-minute advance warning of approaching rogue...IDG News Service From ACM TechNews | February 26, 2016
Researchers have found thousands of mobile applications implement cloud-based, back-end services in a way that lets anyone access sensitive records created by users...IDG News Service From ACM TechNews | November 19, 2015
The Los Alamos National Laboratory is seeking to replace conventional computer systems by developing and obtaining new computer designs.IDG News Service From ACM TechNews | November 13, 2015
Engineers at Xerox PARC have developed a chip that can self-destruct upon command, making it potentially suitable for high-security applications. IDG News Service From ACM TechNews | September 14, 2015
Many types of databases used for electronic medical records are vulnerable to leaking information, according to a new study from Microsoft researchers. IDG News Service From ACM TechNews | September 8, 2015
ACM A.M. Turing Award recipient Manuel Blum believes online passwords can be made more secure by creating what he calls "human computable" passwords. IDG News Service From ACM TechNews | September 2, 2015
Many of the world's top computer science experts met last week to determine how the widespread collection of data about consumers can be prevented from causing...IDG News Service From ACM TechNews | August 31, 2015
Technology experts at an artificial intelligence-themed event were dismissive of scenarios in which super-intelligent machines eventually surpass human intelligence...IDG News Service From ACM TechNews | August 28, 2015
Google chief Internet evangelist Vint Cerf says he finds certain aspects of the Internet of Things particularly worrisome. IDG News Service From ACM TechNews | August 26, 2015
Researchers at Japan's AIST and the Japan Science and Technology Agency have developed stretchable, tough electronics that could be incorporated into clothing,...IDG News Service From ACM TechNews | August 14, 2015
Online voting systems lack sufficient security to ensure accurate vote counts, but election officials could take steps to improve their security and transparency...IDG News Service From ACM TechNews | July 13, 2015
Microsoft is looking for new ideas on potential uses for its HoloLens augmented reality headgear. The company recently issued a request for proposals seeking projects...IDG News Service From ACM TechNews | July 9, 2015
Researchers from Tel Aviv University have developed an easily concealable device that can deduce encryption keys by sniffing the electromagnetic leakage from a...IDG News Service From ACM TechNews | June 22, 2015
Researchers have developed a computer architecture that can harness the unused computer cycles generated by smart home devices. IDG News Service From ACM TechNews | June 17, 2015