Microsoft announced a new version of the Xbox One earlier this week, and with it an improved and essentially reinvented version of Kinect, the company's body- and...Technology Review From ACM Careers | May 23, 2013
Los Alamos National Labs has been running a quantum Internet that can transmit perfectly secure messages for more than two years. Technology Review From ACM TechNews | May 6, 2013
One day, we may be able to check email or call a friend without ever touching a screen or even speaking to a disembodied helper.Technology Review From ACM News | April 29, 2013
Wireless operators have access to an unprecedented volume of information about users' real-world activities, but for years these massive data troves were put to...Technology Review From ACM News | April 18, 2013
Google has developed rings designed to be worn on the finger that provide security for logging into a computer or an online account.Technology Review From ACM TechNews | March 15, 2013
The fact that smartphones and tablets don't need antivirus software or regular software updates is a major reason for their popularity.Technology Review From ACM News | March 12, 2013
A beige office block in Shanghai's suburbs belonging to the Chinese army became world famous on Tuesday after Mandiant, a Washington-based computer security company...Technology Review From ACM News | February 21, 2013
Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating...Technology Review From ACM News | February 14, 2013
University of Colorado at Colorado Springs researchers have developed Vaulted Voice Verification, an approach to voice identification that can be used for voice...Technology Review From ACM TechNews | December 7, 2012
Cloud computing teaches people not to worry about physical equipment for hosting data and running software.Technology Review From ACM News | November 16, 2012
The lack of verifiable security in online voting systems due to unresolved fundamental problems is the main reason such systems are impractical, according to computer...Technology Review From ACM TechNews | November 7, 2012
A decade and a half into the Web revolution, we do much of our banking and shopping online. So why can't we vote over the Internet? The answer is that voting presents...Technology Review From ACM News | November 5, 2012
Next Tuesday's presidential election will likely be extremely close, magnifying the potential impact of vote-counting errors.Technology Review From ACM News | November 2, 2012
The U.S. government's retaliatory capability in response to cyberattacks on critical infrastructure is limited by a dearth of technology. Technology Review From ACM TechNews | October 23, 2012
Computerized hospital equipment is increasingly vulnerable to malware infections, according to participants in a recent government panel. These infections can clog...Technology Review From ACM News | October 18, 2012
The idea of a network of malware-infected zombie computers rigged to do the bidding of criminals conjures up a frightening image on its own. A new visualization...Technology Review From ACM News | October 16, 2012
RSA researchers have developed a system that splits passwords in two and stores each half in different locations. Technology Review From ACM TechNews | October 9, 2012
Security researchers warn that the techniques used in sophisticated, state-supported malware are being used by less-skilled programmers to target Web users. Technology Review From ACM TechNews | September 25, 2012