The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Hourlong disruption affected sites including The New York Times, U.K. government portal; cloud-services provider Fastly reports internal problem.
Global law enforcement officials revealed a three-year operation in which they said they had intercepted over 20 million messages. Hundreds of arrests were made in more than a dozen countries.
Don't expect any significant updates in new Windows 10 preview builds for the next few weeks. It's all about testing the servicing pipeline with new cumulative updates.
The gateway system for the EU's "digital pass" for verifying COVID-19 vaccination or test status went live June 1.
Brown University bioengineers have developed an algorithm that could clear a path to more adaptive deep brain stimulation technology.
Computer scientists developed a deep learning model capable of identifying diseases from medical scans quickly and more accurately.
City lawyers' computer network was disabled after the attack, which the police and federal officials believe was the work of hackers.
IBM, Google, and Microsoft are all developing algorithms that understand the meaning of words.
The problems appear related to Fastly, which runs a content delivery network, and have been largely resolved.
When it came to the tedious task of categorizing pottery fragments, a deep-learning model was found to be just as accurate as four human experts, and far more efficient.
The next version of iPhone operating software will have improved privacy features, Apple says.
The seizure of cryptocurrency paid by Colonial Pipeline to a Russian hacker ring marks a major milestone for the Department of Justice.
It's time to pull this discussion into the modern era and consider what the implications of this "RISC vs. CISC" comparison are for the ARM and x86 CPUs actually shipping today.
Deal with competition authority resolves complaint over the firm's digital advertising tactics.
Engineers at the University of Minnesota have designed a prototype smart bicycle which they say can protect itself from collisions.
TikTok has revised its U.S. privacy policy to say it is permitted it to "collect biometric identifiers and biometric information" from users' content, including "faceprints and voiceprints."
A commercial smartwatch's green light-emitting diode can trigger an implanted molecular switch to regulate insulin production, thanks to researchers at ETH Zurich in Switzerland.
Shadow Figment technology is designed to contain cyberattacks by luring hackers into artificial environments and feeding them false indicators of success.
Amazon subsidiary and Internet-connected doorbell maker Ring said police departments must make future requests for home security video from its doorbells and cameras publicly.
It was the largest Bitcoin event in the world and the first major in-person crypto conference since the pandemic started. The jargon, the liquor, and the millionaire talk flowed.
Rarely seen miscalculations now crop up frequently at cloud hyperscale.
The Twitter Trends platform's algorithm for identifying and alerting Twitter users to popular hashtag-fueled topics is vulnerable to mass-scale manipulation, researchers found.
A memo issued by the White House offers recommendations for private sector organizations to guard against cyberattacks.
The European Union has announced plans for a post-pandemic smartphone application to enable EU residents to access services across the bloc.
Engineering researchers collaborated on the design of the first programmable digital fiber.
Researchers at Spain's Institute of Photonic Sciences have taken a step toward a secure quantum Internet by using crystals to execute quantum teleportation of information.
A global network that would use quantum "entanglement" to weave intimate ties between far-flung users is beginning to take shape.
A United Nations report suggested that a drone, used against militia fighters in Libya's civil war, may have selected a target autonomously.
See the chaos of the Internet in this ridiculously detailed world map.
The court said the Computer Fraud and Abuse Act does not cover people who "have improper motives for obtaining the information that is otherwise available to them."