acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


New Deepfake Detection Tool Should Keep World Leaders Safe--for Now
From ACM TechNews

New Deepfake Detection Tool Should Keep World Leaders Safe--for Now

A new digital forensics technique holds the potential to protect world leaders and celebrities from artificial intelligence-doctored "deepfake" videos.

How Quantum Computer Could Break 2,048-Bit RSA Encryption in 8 Hours
From ACM TechNews

How Quantum Computer Could Break 2,048-Bit RSA Encryption in 8 Hours

Researchers have developed a more efficient technique for decryption calculations by quantum computers.

Russia Wants to Cut Itself Off from the Global Internet. Here's What that Really Means.
From ACM News

Russia Wants to Cut Itself Off from the Global Internet. Here's What that Really Means.

In the next two weeks, Russia is planning to attempt something no other country has tried before. It's going to test whether it can disconnect from the rest of...

Triton Is the World's Most Murderous Malware, and It's Spreading
From ACM News

Triton Is the World's Most Murderous Malware, and It's Spreading

As an experienced cyber first responder, Julian Gutmanis had been called plenty of times before to help companies deal with the fallout from cyberattacks.

A Neural Network Can Learn to Organize the World It Sees Into Concepts, Just Like We Do
From ACM News

A Neural Network Can Learn to Organize the World It Sees Into Concepts, Just Like We Do

GANs, or generative adversarial networks, are the social-media starlet of AI algorithms. They are responsible for creating the first AI painting ever sold at an ...

The ­S and China Are in a Quantum Arms Race that Will Transform Warfare
From ACM News

The ­S and China Are in a Quantum Arms Race that Will Transform Warfare

In the 1970s, at the height of the Cold War, American military planners began to worry about the threat to US warplanes posed by new, radar-guided missile defenses...

These Incredibly Realistic Fake Faces Show How Algorithms Can Now Mess with ­s
From ACM News

These Incredibly Realistic Fake Faces Show How Algorithms Can Now Mess with ­s

These faces don't seem particularly remarkable. They could easily be taken from, say, Facebook or LinkedIn. In reality, they were dreamed up by a new kind of AI...

China's Tech Giants Want to Go Global. Just One Thing Might Stand in Their Way.
From ACM News

China's Tech Giants Want to Go Global. Just One Thing Might Stand in Their Way.

In the early 1980s, a cluster of fledging computer companies opened up shop in a chaotic corner of northwest Beijing, near the campuses of Peking and Tsinghua Universities...

China Has Never Had a Real Chip Industry. Making AI Chips Could Change That.
From ACM News

China Has Never Had a Real Chip Industry. Making AI Chips Could Change That.

Donald Trump is speaking Mandarin.

Machine Learning Identifies Cryptocurrency Scams Before They Happen
From ACM TechNews

Machine Learning Identifies Cryptocurrency Scams Before They Happen

Researchers in the U.K. have developed an algorithm that can predict "pump-and-dump" cryptocurrency scams prior to their occurrence.

­sing Wi-Fi to 'See' Behind Closed Doors Is Easier than Anyone Thought
From ACM TechNews

­sing Wi-Fi to 'See' Behind Closed Doors Is Easier than Anyone Thought

Researchers have developed a technique to see through walls using ambient Wi-Fi signals and an ordinary smartphone.

­sing Wi-Fi to 'See' Behind Closed Doors Is Easier than Anyone Thought
From ACM News

­sing Wi-Fi to 'See' Behind Closed Doors Is Easier than Anyone Thought

Wi-Fi fills our world with radio waves. In your home, in the office, and increasingly on city streets, humans are bathed in a constant background field of 2.4-...

The ­.S. Pushes to Build ­nhackable Quantum Networks
From ACM News

The ­.S. Pushes to Build ­nhackable Quantum Networks

A few years ago, Edward Snowden, a contractor working for the US National Security Agency, leaked documents that showed the ways in which intelligence agenciestapped...

Bot Disguised as a Human Software Developer Fixes Bugs
From ACM TechNews

Bot Disguised as a Human Software Developer Fixes Bugs

A new software bot can find bugs in code and write patches with effectiveness comparable to that of human developers.

China's Leaders Are Softening Their Stance on AI
From ACM News

China's Leaders Are Softening Their Stance on AI

China might be at loggerheads with the United States over trade, but it is calling for a friendlier approach to the development of artificial intelligence.

For Safety’s Sake, We Must Slow Innovation in Internet-connected Things
From ACM News

For Safety’s Sake, We Must Slow Innovation in Internet-connected Things

That's the view of security expert Bruce Schneier, who fears lives will be lost in a cyber disaster unless governments act swiftly.

The 'Neuropolitics' Consultants Who Hack Voters' Brains
From ACM Careers

The 'Neuropolitics' Consultants Who Hack Voters' Brains

Maria Pocovi slides her laptop over to me with the webcam switched on.

­.S. Defense Department Produces First Tools for Catching Deepfakes
From ACM TechNews

­.S. Defense Department Produces First Tools for Catching Deepfakes

U.S. Defense researchers say they have created the first forensic tools for catching fake videos, known as "deepfakes," created with artificial intelligence.

The Defense Department Has Produced the First Tools for Catching Deepfakes
From ACM News

The Defense Department Has Produced the First Tools for Catching Deepfakes

The first forensics tools for catching revenge porn and fake news created with AI have been developed through a program run by the US Defense Department.

Hordes of Research Robots Could Be Hijacked for Fun and Sabotage
From ACM News

Hordes of Research Robots Could Be Hijacked for Fun and Sabotage

Many experimental robots that live in research laboratories around the world may be wide open to hackers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account