acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Ears, Grips, and Fists Take On Mobile Phone ­ser Id
From ACM TechNews

Ears, Grips, and Fists Take On Mobile Phone ­ser Id

Yahoo Labs' Bodyprint is a biometric authentication system that could be used to replace PIN codes for smartphones.

Online Voting a Step Closer Thanks to Breakthrough in Security Technology
From ACM TechNews

Online Voting a Step Closer Thanks to Breakthrough in Security Technology

Researchers say they have developed a new technique that could enable people to cast an election vote online, even if their home computer is infected with malware...

Resilience, Not Abstinence, May Help Teens Battle Online Risk
From ACM TechNews

Resilience, Not Abstinence, May Help Teens Battle Online Risk

Researchers found keeping teens safe on the Internet can be achieved by boosting their ability to cope with online risks, rather than trying to stop them from going...

You Can't Backdoor a Platform
From ACM Opinion

You Can't Backdoor a Platform

According to law enforcement and intelligence agencies, encryption should come with a backdoor.

Smartphone Secrets May Be Better Than a Password
From ACM News

Smartphone Secrets May Be Better Than a Password

Before you read this story, try to answer the following question: Who was the first person to text you today?

Researchers Plan to Demonstrate a Wireless Car Hack This Summer
From ACM News

Researchers Plan to Demonstrate a Wireless Car Hack This Summer

A note of caution to anyone who works on the security team of a major automobile manufacturer: Don't plan your summer vacation just yet.

Security Experts Hack Teleoperated Surgical Robot
From ACM TechNews

Security Experts Hack Teleoperated Surgical Robot

University of Washington in Seattle researchers are studying the issues associated with the communications technology involved in telesurgery. 

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia
From ACM News

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia

Somewhere near Iceland, a new NATO member, Berlya is under cyber-attack, most likely launched from its arch-rival Crimsonia, although the Berlyans can’t be completely...

Biometrics May Ditch the Password, But Not the Hackers
From ACM News

Biometrics May Ditch the Password, But Not the Hackers

Passwords get hacked—a lot.

Cloud Security Reaches Silicon
From ACM TechNews

Cloud Security Reaches Silicon

Researchers are working to implement a way to thwart criminals from inferring computer data based on the pattern in which the machine accesses its memory.

Pentagon Announces New Strategy For Cyberwarfare
From ACM TechNews

Pentagon Announces New Strategy For Cyberwarfare

U.S. Department of Defense Secretary Ashton B. Carter has outlined the circumstances under which the U.S. could use cyberweapons against attackers. 

Should Law Enforcement Have the Ability to Access Encrypted Communications?
From ACM Opinion

Should Law Enforcement Have the Ability to Access Encrypted Communications?

People's distress over the privacy of their communications has never been more acute. Whether the fear is over U.S. surveillance or breaches by hackers of unknown...

Is 'Good Enough' Computing Good Enough?
From Communications of the ACM

Is 'Good Enough' Computing Good Enough?

The energy-accuracy trade-off in approximate computing.

Putting the Data Science Into Journalism
From Communications of the ACM

Putting the Data Science Into Journalism

News organizations increasingly use techniques like data mining, Web scraping, and data visualization to uncover information that would be impossible to identify...

Bug Bounties Fail to Find Many Software Flaws, Researchers Say
From ACM TechNews

Bug Bounties Fail to Find Many Software Flaws, Researchers Say

Researchers say paying rewards to vulnerability researchers to locate flaws in software initially works, but mature software requires a different strategy. 

White House and Department of Homeland Security Want a Way Around Encryption
From ACM News

White House and Department of Homeland Security Want a Way Around Encryption

The White House and U.S. Department of Homeland Security officials support arguments by the nation’s law enforcement and intelligence leaders that encryption technology...

Security Professionals Stymied By Outdated Visualization Tools
From ACM Careers

Security Professionals Stymied By Outdated Visualization Tools

Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down...

How Benford's Law Reveals Suspicious Activity on Twitter
From ACM News

How Benford's Law Reveals Suspicious Activity on Twitter

Back in the 1880s, the American astronomer Simon Newcomb noticed something strange about the book of logarithmic tables in his library—the earlier pages were much...

Smart City Technology May Be Vulnerable to Hackers
From ACM TechNews

Smart City Technology May Be Vulnerable to Hackers

Cesar Cerrudo, chief technology officer at IOActive Labs, says "smart city" technologies are vulnerable to cyberattacks. 

Hackers ­sing Startling New Ways to Steal Your Passwords
From ACM TechNews

Hackers ­sing Startling New Ways to Steal Your Passwords

Rsearchers have found hackers can speculate PINs by interpreting video of people tapping their smartphone screens even when the display is not visible. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account