acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Web 2.0 (and Beyond): Developing the Next Generation of Connectivity
From ACM TechNews

Web 2.0 (and Beyond): Developing the Next Generation of Connectivity

The U.S. National Science Foundation's Global Environment for Network Innovations is a network established to test next-generation networking concepts.

The Moral Challenges of Driverless Cars
From Communications of the ACM

The Moral Challenges of Driverless Cars

Autonomous vehicles will need to decide on a course of action when presented with multiple less-than-ideal outcomes.

Security Researchers Find a Way to Hack Cars
From ACM TechNews

Security Researchers Find a Way to Hack Cars

Security researchers plan to demonstrate a method to hack into and control vehicles at the Black Hat and Def Con hacking conferences in August. 

The Hidden Lab Where Bankcards Are Hacked
From ACM Careers

The Hidden Lab Where Bankcards Are Hacked

It couldn't get any more steampunk if it tried: a wooden robot hisses like an airbrake as a blast of compressed air shoves its arm sideways, sending a credit card...

Hackers Remotely Kill a Jeep on the Highway—with Me in It
From ACM News

Hackers Remotely Kill a Jeep on the Highway—with Me in It

I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold.

Researchers Prove Html5 Can Be ­sed to Hide Malware
From ACM TechNews

Researchers Prove Html5 Can Be ­sed to Hide Malware

The upcoming HTML5 standard could enable hackers to execute drive-by download attacks, according to researchers in Italy. 

Nsa Summer Camp: More Hacking Than Hiking
From ACM TechNews

Nsa Summer Camp: More Hacking Than Hiking

The U.S. National Security Agency is seeking to cultivate middle- and high-school student interest and proficiency in cybersecurity in a new summer camp program...

The Tools Inspectors Can Use to Catch Iran's Nuclear Hijinks
From ACM News

The Tools Inspectors Can Use to Catch Iran's Nuclear Hijinks

After Tuesday's historic agreement between Iran and the "P5+1" group of countries, inspectors from the International Atomic Energy Agency will have access to all...

The Square Kilometre Array: Radio Silence in Western Australia For Most Powerful Telescope in History
From ACM News

The Square Kilometre Array: Radio Silence in Western Australia For Most Powerful Telescope in History

In outback Western Australia, around 350k northeast of the small town of Geraldton, lies an area of land about the size of the Netherlands, but with only 100 humans...

Coders Balk at Making Apps Searchable
From ACM Careers

Coders Balk at Making Apps Searchable

The giants of the Web have been pressing developers of mobile apps to index their content so it can be parsed by search engines or linked to from other sites.

As Tech Firms Track Your Location, Advertisers Zero In For the Sale
From ACM News

As Tech Firms Track Your Location, Advertisers Zero In For the Sale

Mapping technology advancements from Google Inc and Facebook Inc that provide more precise user location data than ever before are starting to dent advertisers'...

New Cyber Programs Debut in California, Louisiana
From ACM TechNews

New Cyber Programs Debut in California, Louisiana

Louisiana Tech University and the University of San Diego are creating new cyber programs. 

National Security Agency Funds ­c Berkeley Cybersecurity Summer Camp For High School Students
From ACM TechNews

National Security Agency Funds ­c Berkeley Cybersecurity Summer Camp For High School Students

The University of California, Berkeley is hosting a camp called CY-BEAR to teach 22 high school students about cybersecurity.

Internet Voting Not Ready Yet, but Can Be Made More Secure
From ACM TechNews

Internet Voting Not Ready Yet, but Can Be Made More Secure

Online voting systems lack sufficient security to ensure accurate vote counts, but election officials could take steps to improve their security and transparency...

The Real Threat Posed By Powerful Computers
From ACM TechNews

The Real Threat Posed By Powerful Computers

Computer specialists are less concerned about computers doing away with the human race than with the threat of programs rapidly overdoing a single task. 

The Social Security Number's Insecurities
From ACM Opinion

The Social Security Number's Insecurities

In both the Anthem insurance hack and the two Office of Personnel Management hacks this year, attackers gained access to Social Security numbers, affecting 80 million...

Unc Explores Future of Transportation
From ACM TechNews

Unc Explores Future of Transportation

University of North Carolina researchers are working with General Motors to create data for a more reliable, safe, and less expensive autonomous car. 

Moxie Marlinspike: The Coder Who Encrypted Your Texts
From ACM News

Moxie Marlinspike: The Coder Who Encrypted Your Texts

Dreadlocked programmer has spooked the FBI by creating a tool that police cannot crack.

How the Audacious Pentagon Agency That Invented the Internet Is Now Trying to Save It
From ACM TechNews

How the Audacious Pentagon Agency That Invented the Internet Is Now Trying to Save It

The U.S. Defense Advanced Research Projects Agency is rethinking the underlying mechanisms of cybersecurity to focus on preventive measures instead of simply breach...

Manhattan Da: Iphone Crypto Locked Out Cops 74 Time
From ACM News

Manhattan Da: Iphone Crypto Locked Out Cops 74 Time

The debate over encryption and backdoors for law enforcement has long had a surplus of opinions and a deficit of data.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account