An Acura RLX sedan demonstrated an unusual way to tow another car this week: the vehicles were not physically attached.Reuters From ACM News | September 15, 2014
NATO leaders agreed on Friday that a large-scale cyber attack on a member country could be considered an attack on the entire U.S.-led alliance, potentially triggering...Reuters From ACM News | September 5, 2014
China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said...Reuters From ACM News | August 25, 2014
In a fast-moving war with an elusive foe like the Islamic State militants, information is as important as guns, jet fighters and bombs.Reuters From ACM Opinion | August 21, 2014
Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight...Reuters From ACM News | August 6, 2014
A highly anticipated talk on how to identify users of the Internet privacy service Tor was withdrawn from the upcoming Black Hat security conference, a spokeswoman...Reuters From ACM News | July 22, 2014
MasterCard Inc, the world's second-largest debit and credit card company, sees business booming from selling data to retailers, banks, and governments on spending...Reuters From ACM Careers | June 17, 2014
Some of the largest U.S. companies are looking to hire cybersecurity experts in newly elevated positions and bring technologists on to their boards, a sign that...Reuters From ACM Careers | May 30, 2014
The U.S. Food and Drug Administration has approved a robotic arm for amputees that is named for the "Star Wars" character Luke Skywalker and can perform multiple...Reuters From ACM News | May 12, 2014
New high-tech, affordable manufacturing tools and new sources of funding are helping launch a generation of entrepreneurs and laying the basis for a hardware renaissance...Reuters From ACM TechNews | May 7, 2014
In the shadow of Internet monoliths such as Facebook, Google and Twitter, it's easy to forget that Silicon Valley got its start from hard-scrabble tinkerers building...Reuters From ACM Careers | May 6, 2014
Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's...Reuters From ACM News | April 1, 2014
The European Commission has created a new campaign to attract women to the information and communications technology sector. Reuters From ACM TechNews | March 12, 2014
Crashing websites and overwhelming data centers, a new generation of cyber attacks is costing millions and straining the structure of the Internet.Reuters From ACM News | March 10, 2014
Last year's revelations over the U.S. tapping of phone and internet data gave telecoms firms pause for thought over whether they should sell their "big data" for...Reuters From ACM News | February 25, 2014
The FBI has warned U.S. retailers to prepare for more cyber attacks after discovering about 20 hacking cases in the past year that involved the same kind of malicious...Reuters From ACM News | January 24, 2014
RegRank is an algorithm that measures how well public feedback is received and incorporated into the rules for Wall Street traders. Reuters From ACM TechNews | January 22, 2014