acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How Emojis Find Their Way to Phones
From ACM TechNews

How Emojis Find Their Way to Phones

The Unicode Consortium, founded in the late 1980s to create a standardized code for text characters, is attracting interest as the arbiter of new emojis. 

Image Too Good to Be True? DARPA Program Targets Image Doctoring
From ACM TechNews

Image Too Good to Be True? DARPA Program Targets Image Doctoring

The U.S. Defense Advanced Research Projects Agency wants to develop an easy-to-use toolset to detect altered images.

Researchers Aim to Make Privacy Second Nature For Software Developers
From ACM TechNews

Researchers Aim to Make Privacy Second Nature For Software Developers

A New York University researcher and colleagues are working to make user privacy an integral part of the software development process. 

Companies Proactively Seek Out Internal Threats
From Communications of the ACM

Companies Proactively Seek Out Internal Threats

Organizations must balance their concerns with the protection of employee privacy.

John H. Holland 1929-2015
From Communications of the ACM

John H. Holland 1929-2015

John Henry Holland, a pioneer in the study of complex adaptive systems and of what became known as genetic algorithms, died in August at the age of 86.

You've Been Misled About What Makes a Good Password
From ACM TechNews

You've Been Misled About What Makes a Good Password

Symantec researchers recently found requiring numbers and uppercase characters in passwords does not do much to make them stronger. 

Why Self-Driving Cars Must Be Programmed to Kill
From ACM News

Why Self-Driving Cars Must Be Programmed to Kill

When it comes to automotive technology, self-driving cars are all the rage.

You Wouldn't Think It, But Typeface Piracy Is a Big Problem
From ACM News

You Wouldn't Think It, But Typeface Piracy Is a Big Problem

It's safe to assume that most people have no idea that fonts, like music or movies, are protected by intellectual property laws, they usually come with a hefty...

X-Ray Scans Expose an Ingenious Chip-and-Pin Card Hack
From ACM News

X-Ray Scans Expose an Ingenious Chip-and-Pin Card Hack

The chip-enabled credit card system long used in Europe, a watered down version of which is rolling out for the first time in America, is meant to create a double...

After 10 Years, Google Books Is Legal
From ACM News

After 10 Years, Google Books Is Legal

On Friday, a federal circuit court made clear that Google Books is legal.

Can Myriad Wireless Networks Connect as One Fast, Secure System?
From ACM TechNews

Can Myriad Wireless Networks Connect as One Fast, Secure System?

U.S. Defense Advanced Research Projects Agency researchers are working on a program that aims to solve critical wireless technology problems. 

New Research Method Identifies Stealth Attacks on Complicated Computer Systems
From ACM TechNews

New Research Method Identifies Stealth Attacks on Complicated Computer Systems

Virginia Polytechnic Institute and State University researchers have developed a program anomaly-detection approach to discovering stealth attacks on computers. ...

­niversities, ­tility Research Protecting Nation's Power Grid From Cyberattacks
From ACM TechNews

­niversities, ­tility Research Protecting Nation's Power Grid From Cyberattacks

The U.S. Department of Energy Center for Securing Electric Energy Delivery Systems  aims to help safeguard U.S. power utilities from cyberattacks. 

Most Americans Would Be Fine with Some Internet Surveillance If They Were Notified
From ACM News

Most Americans Would Be Fine with Some Internet Surveillance If They Were Notified

Despite increasingly heated rhetoric from opponents of government surveillance, a recent survey shows that most Americans would be okay with many kinds of Internet...

Apple Ceo Defends Encryption, Opposes Government Back Door
From ACM News

Apple Ceo Defends Encryption, Opposes Government Back Door

Apple Inc.'s Chief Executive Officer and the director of the National Security Agency squared off on Monday in a debate over how much access technology companies...

Seeing Stars, Again: Naval Academy Reinstates Celestial Navigation
From ACM Careers

Seeing Stars, Again: Naval Academy Reinstates Celestial Navigation

The same techniques guided ancient Polynesians in the open Pacific and led Sir Ernest Shackleton to remote Antarctica, then oriented astronauts when the Apollo...

Researchers Find 85 Percent of Android Devices Insecure
From ACM TechNews

Researchers Find 85 Percent of Android Devices Insecure

Researchers have developed a scorecard for Android devices based on how often manufacturers and network operators patch their devices. 

How Human Nature Could Foil Tesla's New Autopilot
From ACM TechNews

How Human Nature Could Foil Tesla's New Autopilot

Researchers and driving safety experts warn the new autopilot option installed in most Tesla vehicles could cause unsafe conditions. 

How the Nsa Can Break Trillions of Encrypted Web and Vpn Connections
From ACM News

How the Nsa Can Break Trillions of Encrypted Web and Vpn Connections

For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic...

Closing Cybersecurity's Race Gap
From ACM TechNews

Closing Cybersecurity's Race Gap

During an event on Capitol Hill, experts discussed the U.S. government cybersecurity labor shortage and the underrepresentation of women and minorities in the field...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account