acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Defending Your Computer From Cyberattacks, Sun Tzu Style
From ACM TechNews

Defending Your Computer From Cyberattacks, Sun Tzu Style

Deception has been used to thwart cyberattacks before, mostly in "honeypot" strategies, but what sets a new operating system apart is inconsistent deception. 

Bluetooth and Wi-Fi Sensing From Mobile Devices May Help Improve Bus Service
From ACM TechNews

Bluetooth and Wi-Fi Sensing From Mobile Devices May Help Improve Bus Service

University of Washington researchers say they have developed a low-cost way to harness useful data from bus passengers' mobile device Wi-Fi and Bluetooth signals...

Europe's Top Digital-Privacy Watchdog Zeros In on ­.s. Tech Giants
From ACM News

Europe's Top Digital-Privacy Watchdog Zeros In on ­.s. Tech Giants

The latest standoff between Europe and American tech companies runs through a quiet street just north of the Louvre Museum, past chic cafes and part of the French...

ACM Inducts Fellows
From Communications of the ACM

ACM Inducts Fellows

ACM has recognized 42 of its members for significant contributions to the development and application of computing, in areas ranging from data management and spoken...

How a Supervillain (or a Hacker in His Basement) Could Destroy the Internet
From Communications of the ACM

How a Supervillain (or a Hacker in His Basement) Could Destroy the Internet

Network experts share their greatest fears about attacks and accidents that could destroy the Internet.

In Privacy Law, It's the U.S. vs. the World
From Communications of the ACM

In Privacy Law, It's the U.S. vs. the World

Snowden revelations force changes, but Facebook (and others) resist.

British Voice Encryption Protocol Has Massive Weakness, Researcher Says
From ACM TechNews

British Voice Encryption Protocol Has Massive Weakness, Researcher Says

A researcher charges the protocol created by a U.K. governmental group to encrypt voice calls has a weakness built into it by design that could enable mass surveillance...

­.s. Military Wants to Create Cyborg Soldiers
From ACM TechNews

­.s. Military Wants to Create Cyborg Soldiers

The U.S. Defense Advanced Research Projects Agency is working to create a chip to implant in a soldier's brain to connect it directly to computers. 

German ­niversity Reports Severe Software Vulnerabilities ­p in 2015
From ACM TechNews

German ­niversity Reports Severe Software Vulnerabilities ­p in 2015

Fewer software security vulnerabilities were reported worldwide in 2015 than in 2014, but the number of published vulnerabilities with a high level of severity...

Bridging the Bio-Electronic Divide
From ACM News

Bridging the Bio-Electronic Divide

A new DARPA program aims to develop an implantable neural interface able to provide unprecedented signal resolution and data-transfer bandwidth between the human...

Shrinking the Haystack
From ACM TechNews

Shrinking the Haystack

Technologists are helping counter-terrorist forces with software that can identify locations to be searched for hideouts and weapons, or be put under surveillance...

Malicious Coders Will Lose Anonymity as Identity-Finding Research Matures
From ACM TechNews

Malicious Coders Will Lose Anonymity as Identity-Finding Research Matures

Researchers from three universities and the U.S. Army Research Laboratory are trying to address the problem of identifying authors of malicious code and software...

For Now, Self-Driving Cars Still Need Humans
From ACM News

For Now, Self-Driving Cars Still Need Humans

Car enthusiasts, after hearing industry executives discussing the self-driving technology being built into their vehicles, might be forgiven for thinking robotic...

New App 'hides' ­ser Location From Third Parties
From ACM TechNews

New App 'hides' ­ser Location From Third Parties

A new app blocks third parties from identifying an individual's location based on what they search for online. 

Wikipedia Turns 15
From ACM Opinion

Wikipedia Turns 15

It must be difficult for the roughly half a billion people who visit Wikipedia every month to remember a world without the free online encyclopedia.

The Convenience-Surveillance Tradeoff
From ACM News

The Convenience-Surveillance Tradeoff

People love free stuff. That's the principle that helps explain the complicated series of privacy-related calculations that modern life increasingly requires.

Shrouding Oneself in Secrecy
From ACM News

Shrouding Oneself in Secrecy

Identity cloaking tools, developed to protect the privacy of Internet users, are being used to skirt cybersecurity and international law.

­w Computer Scientists to Make Financial Products Better and More Available For the Poor
From ACM TechNews

­w Computer Scientists to Make Financial Products Better and More Available For the Poor

University of Washington computer scientists and engineers plan to develop, test, and deploy technologies to make financial applications more available to the poor...

An Easy Way For Hackers to Remotely Burn Industrial Motors
From ACM News

An Easy Way For Hackers to Remotely Burn Industrial Motors

Hacks that cause physical destruction are so rare they can be counted on one hand.

Prediction Machines Will See the Future For Hedge Funds, CIA
From ACM News

Prediction Machines Will See the Future For Hedge Funds, CIA

Every time a new year rolls in, lots of people make predictions. Most will either be obvious (Apple will put out some new products) or wrong (still waiting for...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account