acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Could AI Be the Future of Fake News and Product Reviews?
From ACM TechNews

Could AI Be the Future of Fake News and Product Reviews?

Researchers are experimenting with artificial intelligence-based techniques for automatically generating convincing online reviews, such as bogus restaurant critiques...

The World Once Laughed at North Korean Cyberpower. No More.
From ACM News

The World Once Laughed at North Korean Cyberpower. No More.

When North Korean hackers tried to steal $1 billion from the New York Federal Reserve last year, only a spelling error stopped them.

Twitter Is Crawling With Bots and Lacks Incentive to Expel Them
From ACM News

Twitter Is Crawling With Bots and Lacks Incentive to Expel Them

On Wednesday, the exterior of Twitter's San Francisco headquarters bore an eerie message: "Ban Russian Bots." Someone—the company doesn't know who—projected the...

How Do You Build the Next-Generation Internet?
From ACM News

How Do You Build the Next-Generation Internet?

Imagine super-fast computers that can solve problems much quicker than machines today.

Mathematical Modeling For Better Designs and Simulations
From ACM TechNews

Mathematical Modeling For Better Designs and Simulations

Dublin City University professor Patricia Moore in Ireland says she tries "to make it easier for computers to solve simulation problems as efficiently and accurately...

The Female Code Breakers Who Helped Defeat the Nazis
From ACM TechNews

The Female Code Breakers Who Helped Defeat the Nazis

More than 10,000 female "cryptoanalysts" were enlisted by the U.S. Army and Navy to help crack Nazi codes and ensure the Allies' victory in World War II.

Two Computer Scientists Among 2017 Macarthur 'genius' Grant Winners
From ACM News

Two Computer Scientists Among 2017 Macarthur 'genius' Grant Winners

Two computer scientists are recognized for pushing the boundaries of machine learning and cybersecurity.

The Scientist Who Spots Fake Videos
From ACM Opinion

The Scientist Who Spots Fake Videos

Hany Farid, a computer scientist at Dartmouth College in Hanover, New Hampshire, specialises in detecting manipulated images and videos. Farid, who provides his...

The Race to Secure Voting Tech Gets an ­rgent Jumpstart
From ACM TechNews

The Race to Secure Voting Tech Gets an ­rgent Jumpstart

There is an urgent need to secure U.S. voting systems ahead of the 2018 midterm elections, according to a report by the Atlantic Council think tank and hacking...

How Israel Caught Russian Hackers Scouring the World For ­.s. Secrets
From ACM News

How Israel Caught Russian Hackers Scouring the World For ­.s. Secrets

It was a case of spies watching spies watching spies: Israeli intelligence officers looked on in real time as Russian government hackers searched computers around...

Building the Blockchain to End All Blockchains
From ACM TechNews

Building the Blockchain to End All Blockchains

Despite the potential benefits of blockchain technology, it needs to overcome challenges in scalability, speed, and flexibility.

Google, Facebook and Twitter scramble to Hold Washington at Bay
From ACM Careers

Google, Facebook and Twitter scramble to Hold Washington at Bay

Google summoned about 200 policy staff from around the world last month for a debate on whether the company's size has made it too attractive as a target for government...

Warning: This Algorithm Will Self-Destruct After It's ­sed
From ACM TechNews

Warning: This Algorithm Will Self-Destruct After It's ­sed

Two researchers say they have built a proof-of-principle algorithm that destroys itself after use.

Russians Took a Page from Corporate America By ­sing Facebook Tool to Id and Influence Voters
From ACM News

Russians Took a Page from Corporate America By ­sing Facebook Tool to Id and Influence Voters

Russian operatives set up an array of misleading Web sites and social media pages to identify American voters susceptible to propaganda, then used a powerful Facebook...

China Demonstrates Quantum Encryption By Hosting a Video Call
From ACM News

China Demonstrates Quantum Encryption By Hosting a Video Call

Chinese researchers have completed a practical demonstration of quantum key distribution, showing that it's possible to encrypt and send data between two locations...

Scientists in Mexico Scramble to Deploy Seismic Sensors
From ACM News

Scientists in Mexico Scramble to Deploy Seismic Sensors

Late one night in September, Victor Cruz, a geophysicist at Mexico's National Autonomous University, submitted an article to a scientific journal describing progress...

­Understanding Ethereum, Bitcoin's Virtual Cousin
From ACM Careers

­Understanding Ethereum, Bitcoin's Virtual Cousin

Bitcoin has many cousins and competitors. None have grown more popular than Ethereum, a global computer network with its own virtual currency, called Ether.

The Coming Software Apocalypse
From ACM TechNews

The Coming Software Apocalypse

A group of coders is trying to work past the abstract approach to programming.

As N. Korea Threatens Nuclear Missile Test, Are ­.s. Ballistic Defenses Ready?
From ACM News

As N. Korea Threatens Nuclear Missile Test, Are ­.s. Ballistic Defenses Ready?

After suffering yet another round of sanctions, as well as a provocative UN speech and further sanctions from President Donald Trump, North Korea's leaders have...

Goodbye, Login. Hello, Heart Scan
From ACM TechNews

Goodbye, Login. Hello, Heart Scan

A new computer security system uses heart dimensions for identification.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account