The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
The Biden administration has been trying to choke off use of hacking tools made by the Israeli firm NSO. It turns out that not every part of the government has...The New York Times From ACM News | April 3, 2023
Participants of the Pwn2Own software exploitation conference hacked technology from automaker Tesla twice at the Zero Day Initiative's Pwn2Own software exploitation...PC Magazine From ACM TechNews | March 29, 2023
The Biden administration says commercial spyware has proliferated in recent years with few controls and a high risk of abuse.
USA Today From ACM News | March 28, 2023
White House bans federal agencies from using spyware that poses national security and human rights risks in the U.S.
The Washington Post From ACM News | March 28, 2023
Utah's Governor Spencer J. Cox signed a social media bill that could restrict access to applications like TikTok and Instagram by children and adolescents.
The New York Times From ACM TechNews | March 28, 2023
General Bytes reported that over $1.5 million in bitcoin was drained from Internet-accessible wallets via its bitcoin ATMs by hackers that exploited a previously...Ars Technica From ACM TechNews | March 27, 2023
Researchers developed the Near-Ultrasound Inaudible Trojan to show how hackers can exploit the vulnerabilities of smart device microphones and voice assistants...University of Texas at San Antonio From ACM TechNews | March 24, 2023
Researchers in Google's Mandiant division have found state-sponsored hackers in China have been evading common cybersecurity tools and spying on government and...The Wall Street Journal From ACM TechNews | March 22, 2023
Government employees in the United States and internationally often reuse passwords for their work and personal accounts, according to researchers at threat intelligence...GCN From ACM TechNews | March 20, 2023
Meme-makers and misinformation peddlers are embracing artificial intelligence tools to create convincing fake videos on the cheap.
The New York Times From ACM News | March 13, 2023
Researchers at Slovak cybersecurity firm ESET have found the first real-world case of Unified Extensible Firmware Interface malware that can take over a computer's...Ars Technica From ACM TechNews | March 9, 2023
Rather than obtaining a warrant, the bureau purchased sensitive data—a controversial practice that privacy advocates say is deeply problematic.
Wired From ACM News | March 9, 2023
Tech innovations are again racing ahead of Washington's ability to regulate them, lawmakers and A.I. experts said.
The New York Times From ACM News | March 6, 2023
Companies like Paradromics and Synchron are competing with Elon Musk's Neuralink to design a brain implant that can communicate with computers.
The Washington Post From ACM TechNews | March 6, 2023
Researchers in France found so-called "cat qubits” (quantum bits) could reduce errors by quantum computers and accelerate the cracking of common encryption algorithms...New Scientist From ACM TechNews | March 6, 2023
The policy document urges more mandates on the firms that control most of the nation's digital infrastructure, and an expanded government role to disrupt hackers...The New York Times From ACM News | March 3, 2023
The plan touts many of the cybersecurity regulations already handed down for oil and natural gas pipelines, aviation, rail, and water systems, but it notes that...The Record From ACM News | March 2, 2023