The news archive provides access to past news stories from Communications of the ACM and other sources by date.
The apps took users' precise location, email, phone numbers, and more, researchers said.
The predictions are run by humans along the way.
Lawmakers advance proposals to let police forces across the EU link their photo databases—which include millions of pictures of people's faces.
A Russian armored convey headed toward Kyiv was halted by night ambushes by Ukrainian special forces and drone operators who are part of an air reconnaissance unit known as Aerorozvidka.
A new algorithm may help detect autism by analyzing functional magnetic resonance imaging rain scans, and can also forecast the severity of autism symptoms in individuals.
Researchers have created an architecture for a robotic manipulation system that could teach robots to handle pizza dough.
Apple recently released patches for two critical zero-day vulnerabilities discovered by an anonymous researcher that affect the operating systems of iPhones, iPads, and Macs.
The AI algorithm could be uploaded to processors on some of China's Earth observation satellites already in orbit without any ground assistance: researchers.
U.S. officials worked with law enforcement in the U.K., and network security company WatchGuard, to analyze the malware and develop detection and remediation tools.
According to Slovak security firm ESET, the malicious apps are tied to websites spoofing legitimate services in Malaysia, including six clearing services and a pet store.
Offering rewards for the identification of bias in algorithms.
The image-focused social network says it will take down content that distorts or denies facts of climate crisis.
Apple and Google are pushing privacy changes, but a shift in digital tracking is giving some platforms a bigger advertising advantage.
The existence of secure cryptography depends on one of the oldest questions in computational complexity.
Code placed in consumer-facing apps is tied to U.S. national-security contractors, documents show.
Experts say the hackers' intentions might not be to actually trick anyone, but to erode confidence in Ukrainian media outlets and institutions.
A gifted mathematician, Zdanovska began participating in Informatics, Mathematics, and Physics Olympiads during her time in elementary school.
Kyiv city officials have been working to adapt and repurpose the Ukrainian capital's technology amid the war with Russia.
Cities like Orlando, FL, and Singapore are using digital twins to generate virtual models of themselves, in order to simulate the effects of potential new policies or infrastructure projects.
Researchers in the Shadytel telecommunications and embedded device hacking group used a decommissioned Canadian satellite to broadcast a livestream to the Northern Hemisphere.
University of Pennsylvania researchers have developed an approach that enables a neural network to run a code like a standard computer.
Pieter Abbeel's groundbreaking research helped shape contemporary robotics and continues to drive the future of the field.
North Carolina State University researchers have determined that Facebook's targeted advertising algorithm does not account for the context of users' activities.
A team of multi-institutional scientists has developed a single-fiber acoustic sensor that can transform fabrics into microphones and speakers.
A pilot program launched by Exxon Mobil Corp. involves powering cryptocurrency-mining operations using excess natural gas that otherwise would be burned off from oil wells in North Dakota.
The newly-minted office starts its work as U.S. and world leaders fret about cyberattacks spilling out of Russia's unprovoked invasion of neighboring Ukraine.
One ransomware attack struck a professional football team as competitors were preparing for the Super Bowl.
A stake of less than 10% in a company is considered "passive" by Wall Street, but it could signal an effort by Musk to take a more active role in how Twitter is run.
Entrepreneurs in Poland are rushing three-dimensional printers to Ukraine for the manufacture of defensive equipment.