Hundreds of small drones from U.S. startups are searching for survivors and Russian hideouts in Ukraine, after Ukrainian government officials cited Chinese drones...The Wall Street Journal From ACM TechNews | April 27, 2022
Despite millions of dollars in losses, iBuying's failure doesn't signal the end of tech-led disruption, just a fumbled beginning.
MIT Technology Review From ACM News | April 27, 2022
European policymakers reached a deal on the Digital Services Act which would force Silicon Valley companies to more aggressively police harmful content on their...The Washington Post From ACM News | April 25, 2022
Researchers at the U.K.’s University of Oxford found that iOS apps can still track users without explicit permission.
Ars Technica From ACM TechNews | April 25, 2022
With demand exceeding the available workforce, more cybersecurity and risk executives are seeking candidates without degrees or traditional technology backgrounds...The Wall Street Journal From ACM TechNews | April 22, 2022
Expert witness in Lords police tech inquiry welcomes committee's findings but questions whether its recommendations.
ComputerWeekly (U.K.) From ACM News | April 22, 2022
Proponents of artificial intelligence believe it can be used to predict, and help to prevent, dangerous driving behaviors.
The New York Times From ACM TechNews | April 20, 2022
The Ninth Circuit's decision is a major win for archivists, academics, researchers, and journalists who use tools to collect, or scrape, information that is publicly...TechCrunch From ACM News | April 20, 2022
A glitch that affects up to 9,000 retirees is one of the longest-lasting effects of the devastating ransomware attack that cost the district roughly $10 million... From ACM News | April 19, 2022
Today's warnings are different from those of the last decade. Investors tiptoe around the word "bubble," referring instead to a "recalibration," a "pullback" or... From ACM News | April 19, 2022
The hacking incident occurred in March 2022, resulting in the theft of more than $600 million in Ethereum and USDC stablecoins.
Computing (U.K.) From ACM News | April 19, 2022
Even the smallest window of opportunity for snooping cab pose a threat to the intellectual property and privacy of neural architectures.
From ACM News | April 19, 2022
The inside story of the world's most notorious commercial spyware and the big tech companies waging war against it.
The New Yorker From ACM News | April 19, 2022
Researchers at New York-based cybersecurity startup Cynerio identified five zero-day vulnerabilities affecting Aethon TUG smart autonomous robots used in hospitals...The Jerusalem Post (Israel) From ACM TechNews | April 18, 2022
The Dutch tax authority ruined thousands of lives after using an algorithm to spot suspected benefits fraud — and critics say there is little stopping it from happening...Politico From ACM News | April 18, 2022