acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Simulation Highlights Potential For Low-Cost Security Imaging Device
From ACM TechNews

Simulation Highlights Potential For Low-Cost Security Imaging Device

Researchers say they are developing security imaging technology that would cost less than scanning devices used in airports to detect hidden weapons or contraband...

The Bizarre World of Bitcoin 'mining' Finds a New Home in Tibet
From ACM News

The Bizarre World of Bitcoin 'mining' Finds a New Home in Tibet

Inside a metal shed in the Tibetan highlands of western China, thousands of microprocessors flank narrow corridors, generating a constant hum and stifling waves...

AI Can Recognize Your Face Even If You're Pixelated
From ACM News

AI Can Recognize Your Face Even If You're Pixelated

Pixelation has long been a familiar fig leaf to cover our visual media’s most private parts.

Setting Up a Decoy Network May Help Deflect a Hacker's Hits
From ACM TechNews

Setting Up a Decoy Network May Help Deflect a Hacker's Hits

Researchers have created a computer defense system that senses possible malicious probes of a network and redirects the attack to a virtual network.

Smartphone Hacks 3D Printer By Measuring 'leaked' Energy and Acoustic Waves
From ACM TechNews

Smartphone Hacks 3D Printer By Measuring 'leaked' Energy and Acoustic Waves

State University of New York at Buffalo researchers say anyone with a smartphone could potentially steal intellectual property from a business' three-dimensional...

Microsoft's Top Lawyer Becomes a Civil Rights Crusader
From ACM Opinion

Microsoft's Top Lawyer Becomes a Civil Rights Crusader

When Apple CEO Tim Cook refused to help the FBI get into a mass murderer's iPhone last winter, he was hailed for his boldness in fighting the government on ...

Your Car's New Software Is Ready. Update Now?
From ACM News

Your Car's New Software Is Ready. Update Now?

Tired of your vehicle and its aging, limited features? Don’t trade it in just yet. Download new software instead.

CMU Algorithm Detects Online Fraudsters
From ACM TechNews

CMU Algorithm Detects Online Fraudsters

Carnegie Mellon University researchers say they have developed an algorithm that can perceive fraudsters hiding behind a digital veneer of legitimacy.

Google's Clever Plan to Stop Aspiring Isis Recruits
From ACM News

Google's Clever Plan to Stop Aspiring Isis Recruits

Google has built a half-trillion-dollar business out of divining what people want based on a few words they type into a search field.

We're Ahead of Schedule to Turn 'star Trek' Tech Into Reality
From ACM News

We're Ahead of Schedule to Turn 'star Trek' Tech Into Reality

Most Star Trek stories from the vaunted franchise turning 50 this week take place in a distant future we're not likely to see.

Research Examines Global Security and Surveillance Technologies
From ACM TechNews

Research Examines Global Security and Surveillance Technologies

Government efforts to fight crime using surveillance and information technologies often yield poor results, says University of Colorado Denver professor Keith Guzik...

Does the Messaging Service Telegram Take Privacy Too Far?
From ACM News

Does the Messaging Service Telegram Take Privacy Too Far?

The encryption of digital information is considered the best protection against hackers, snoops or potential enemies looking to poke around into private exchanges...

Keystroke Recognition ­ses Wi-Fi Signals to Snoop
From ACM TechNews

Keystroke Recognition ­ses Wi-Fi Signals to Snoop

Researchers have learned how to use off-the-shelf computer gear and a standard Wi-Fi connection to read keystrokes from a person in close proximity.

How Spy Tech Firms Let Governments See Everything on a Smartphone
From ACM News

How Spy Tech Firms Let Governments See Everything on a Smartphone

Want to invisibly spy on 10 iPhone owners without their knowledge? Gather their every keystroke, sound, message and location?

Building a New Tor that Can Resist Next-Generation State Surveillance
From ACM News

Building a New Tor that Can Resist Next-Generation State Surveillance

Since Edward Snowden stepped into the limelight from a hotel room in Hong Kong three years ago, use of the Tor anonymity network has grown massively.

So Much for Counter-Phishing Training: Half of People Click Anything Sent to Them
From ACM News

So Much for Counter-Phishing Training: Half of People Click Anything Sent to Them

Security experts often talk about the importance of educating people about the risks of "phishing" e-mails containing links to malicious websites. But sometimes...

Forget Software: Now Hackers Are Exploiting Physics
From ACM News

Forget Software: Now Hackers Are Exploiting Physics

Practically every word we use to describe a computer is a metaphor.

Here's How Russian Hackers Could Actually Tip an American Election
From ACM Opinion

Here's How Russian Hackers Could Actually Tip an American Election

Reports this week of Russian intrusions into U.S. election systems have startled many voters, but computer experts are not surprised.

Comey: Fbi Wants 'adult Conversation' on Device Encryption
From ACM News

Comey: Fbi Wants 'adult Conversation' on Device Encryption

FBI Director James Comey warned again Tuesday about the bureau's inability to access digital devices because of encryption and said investigators were collecting...

System Might Detect Doctored Images and Videos For the Military
From ACM TechNews

System Might Detect Doctored Images and Videos For the Military

An international coalition of researchers is developing technologies that could help the U.S. military detect manipulations of open source images.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account