acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


G.e., the 124-Year-Old Software Start-­p
From ACM Careers

G.e., the 124-Year-Old Software Start-­p

It may not qualify as a lightning-bolt eureka moment, but Jeffrey R. Immelt, chief executive of General Electric, recalls the June day in 2009 that got him thinking...

Secure Networks For the Internet of the Future
From ACM TechNews

Secure Networks For the Internet of the Future

Researchers at Bavaria, Germany's University of Wurzburg are developing secure and efficient networks for the Internet of the future.

Apple Issues Global Ios ­pdate After Attempt to ­se Spyware on Activist's Iphone
From ACM News

Apple Issues Global Ios ­pdate After Attempt to ­se Spyware on Activist's Iphone

A botched attempt to break into the iPhone of an Arab activist using hitherto unknown espionage software has triggered a global upgrade of Apple's mobile operating...

Chaos Could Provide the Key to Enhanced Wireless Communications
From ACM TechNews

Chaos Could Provide the Key to Enhanced Wireless Communications

Researchers have shown that adding chaos to wireless communication can augment its reliability, efficiency, and security.

Self-Driving Cars Reach a Fork in the Road, and Automakers Take Different Routes
From ACM TechNews

Self-Driving Cars Reach a Fork in the Road, and Automakers Take Different Routes

Automakers are taking divergent approaches to the development and deployment of driverless vehicles.

All the Ways Your Wi-Fi Router Can Spy on You
From ACM News

All the Ways Your Wi-Fi Router Can Spy on You

City dwellers spend nearly every moment of every day awash in Wi-Fi signals.

Blockchain Could Bring Electronic Voting to Australia By 2017
From ACM TechNews

Blockchain Could Bring Electronic Voting to Australia By 2017

Australia intends to employ blockchain technology to let citizens vote online.

Reconciling Quantum Physics with Math
From Communications of the ACM

Reconciling Quantum Physics with Math

Mathematicians explore the root of many problems in developing a proof for the Kadison-Singer problem.

Researchers Create 3D Faces From Online Photos to Defeat Face Authentication Systems
From ACM TechNews

Researchers Create 3D Faces From Online Photos to Defeat Face Authentication Systems

Researchers say they have developed a virtual reality-based cyberattack that can reproduce the human face well enough to trick face-authentication systems.

Hints Suggest an Insider Helped the Nsa 'equation Group' Hacking Tools Leak
From ACM News

Hints Suggest an Insider Helped the Nsa 'equation Group' Hacking Tools Leak

A group called the Shadow Brokers made headlines this month by leaking a hacking tool belonging to the NSA's Tailored Access Operations (TAO) team. Now this week...

Happy 25th Birthday to the World Wide Web
From ACM News

Happy 25th Birthday to the World Wide Web

Internauts, today we celebrate this glorious technology that brings us all together! On August 23, 1991--25 years ago today--the public gained access for the first...

Linux Turns 25, Is Bigger and More Professional Than Ever
From ACM News

Linux Turns 25, Is Bigger and More Professional Than Ever

The Linux operating system kernel is 25 years old this month. It was August 25, 1991 when Linus Torvalds posted his famous message announcing the project, claiming...

Chip Technology Keeps Checked Luggage in Check
From ACM News

Chip Technology Keeps Checked Luggage in Check

On a recent Southwest Airlines flight from Baltimore, Shvilla Rasheem arrived in Indianapolis, but her luggage did not.

Internet Voting Leaves Out a Cornerstone of Democracy: The Secret Ballot
From ACM TechNews

Internet Voting Leaves Out a Cornerstone of Democracy: The Secret Ballot

Internet voting invalidates the secrecy of ballots, according to a report from Verified Voting.

These States Are at the Greatest Risk of Having Their Voting Process Hacked
From ACM News

These States Are at the Greatest Risk of Having Their Voting Process Hacked

Not everything belongs on the Internet, and the American electoral process is a textbook example. But 31 states don't see it that way.

98 Personal Data Points that Facebook ­ses to Target Ads to You
From ACM News

98 Personal Data Points that Facebook ­ses to Target Ads to You

Say you're scrolling through your Facebook Newsfeed and you encounter an ad so eerily well-suited, it seems someone has possibly read your brain.

Navy Looking at Teaching Robots How to Behave
From ACM TechNews

Navy Looking at Teaching Robots How to Behave

The U.S. Navy is funding projects to train autonomous systems to not harm humans.

Nowhere to Hide: ­c San Diego Researchers Devise New Method For Detecting Hardware Trojans
From ACM TechNews

Nowhere to Hide: ­c San Diego Researchers Devise New Method For Detecting Hardware Trojans

A new technique for detecting Trojans hidden in a device's hardware has been developed by University of California, San Diego computer scientists.

The Shadow Brokers Mess Is What Happens When the Nsa Hoards Zero-Days
From ACM News

The Shadow Brokers Mess Is What Happens When the Nsa Hoards Zero-Days

When the NSA discovers a new method of hacking into a piece of software or hardware, it faces a dilemma.

Powerful Nsa Hacking Tools Have Been Revealed Online
From ACM TechNews

Powerful Nsa Hacking Tools Have Been Revealed Online

The online exposure of some of the most powerful hacking tools developed by the U.S. National Security Agency could threaten the agency's operations and security...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account