By knitting together multiple components and data streams, multimodal AI offers the promise of smarter, more human-like systems…
From ACM NewsSamuel Greengard| December 7, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
A security freelancer has published a proof-of-concept code for exploiting a security flaw in the Dual Elliptic Curve Deterministic Random Bit Generator. ZDNet From ACM TechNews | January 7, 2014
Microsoft has announced plans to launch three bug bounty programs designed to eliminate security vulnerabilities in its software. ZDNet From ACM TechNews | June 21, 2013
Israel is recruiting top students for a new cyberwarfare training program. The program shows how Israel is advancing in the field of cybernetics to develop "high...ZDNet From ACM TechNews | January 3, 2013
It appears that Osama bin Laden didn’t encrypt any of his computer files. If he had, U.S. authorities probably wouldn’t have been able to do much after confiscating...ZDNet From ACM News | May 4, 2012
The mysterious Stuxnet worm took center stage at the Virus Bulletin 2010 conference here with a prominent security researcher dropping a raw hint that Israel may...ZDNet From ACM News | October 1, 2010
There needs to be a global cybersecurity peace treaty to avert the threat of international cyberwar, whose effects would be more devastating than a tsunami, says...ZDNet UK From ACM TechNews | September 8, 2010
The issue of security is holding back its full potential of cloud computing. This was the gist of the keynote message presented Tuesday (March 2) by Art Coviello...ZDNet Asia From ACM News | March 3, 2010
The European Commission has proposed that software companies should be held liable for the security and efficiency of their products. Ovum's David Mitchell says...ZDNet Asia From ACM TechNews | June 12, 2009
Researchers from the Information Security Group (ISG) at Royal Holloway, University of London have discovered an underlying flaw in the OpenSSH encryption protocol...ZDNet K From ACM TechNews | May 21, 2009
A group of pioneers in the security field, whose work in encryption is used to protect Internet data and communications every day, spoke recently about the state...ZDNet Asia From ACM News | April 23, 2009
World Wide Web Consortium director Sir Tim Berners-Lee says the Semantic Web will improve online privacy protection by allowing Internet users to control who can...ZDNet K From ACM TechNews | March 16, 2009