acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How Cybersecurity Became Your Problem
From ACM TechNews

How Cybersecurity Became Your Problem

Cyberattacks threaten to rise in frequency and complexity, which makes every person using modern technology a potential target. 

Know Instantly How Much Privacy a Website Visit Costs You
From ACM TechNews

Know Instantly How Much Privacy a Website Visit Costs You

An Italian researcher has developed algorithms that can calculate the privacy costs of websites. 

Can You Vote For the Next President on Your Smartphone? Not Just Yet.
From ACM TechNews

Can You Vote For the Next President on Your Smartphone? Not Just Yet.

The U.S. Election Assistance Commission has approved a measure to update the security and accessibility guidelines for voting machines. 

How Google Is Making Sure Cows Won't Foil Its Self-Driving Cars
From ACM News

How Google Is Making Sure Cows Won't Foil Its Self-Driving Cars

Most of us haven't had a cow wander on to a road in front of us while we're driving. Still, it's the type of situation Google is wisely anticipating.

Hbo's John Oliver Hits Snowden Hard on Nsa Leaks
From ACM Opinion

Hbo's John Oliver Hits Snowden Hard on Nsa Leaks

Edward Snowden and an unlikely interviewer squared-off on HBO over the leaks that exposed the National Security Agency's extensive surveillance programs.

Study Shows People Act to Protect Privacy When Told How Often Phone Apps Share Personal Information
From ACM TechNews

Study Shows People Act to Protect Privacy When Told How Often Phone Apps Share Personal Information

Smartphone users will limit the information to which their smartphone apps have access, when they learn how frequently their information is shared with these apps...

Novel Graph Method Detects Cyberattack Patterns in Complex Computing Networks
From ACM TechNews

Novel Graph Method Detects Cyberattack Patterns in Complex Computing Networks

Scientists have developed a framework allowing users to categorize cyberattacks as graph patterns. 

­ab Rolls Out New Technology to Help ­sers Combat Mobile Malware Attacks
From ACM TechNews

­ab Rolls Out New Technology to Help ­sers Combat Mobile Malware Attacks

University of Alabama at Birmingham researchers say they have developed new techniques to prevent sophisticated malware from attacking smartphones. 

Google’s Project Zero Aims to 'improve Security Across the Internet'
From ACM News

Google’s Project Zero Aims to 'improve Security Across the Internet'

Google has assembled 'the best practically-minded security researchers' to 'significantly reduce the number of people harmed by targeted attacks.'

Toolkits For the Mind
From ACM Opinion

Toolkits For the Mind

When the Japanese computer scientist Yukihiro Matsumoto decided to create Ruby, a programming language that has helped build Twitter, Hulu, and much of the modern...

U.s. Establishes Sanctions Program to Combat Cyberattacks, Cyberspying
From ACM News

U.s. Establishes Sanctions Program to Combat Cyberattacks, Cyberspying

President Obama on Wednesday signed an executive order establishing the first sanctions program to allow the administration to impose penalties on individuals overseas...

Stanford Crypto Expert Dan Boneh Wins $175k Computer Science Award
From ACM TechNews

Stanford Crypto Expert Dan Boneh Wins $175k Computer Science Award

Stanford University professor Dan Boneh's contributions to cryptography have earned him the 2014 ACM-Infosys Foundation Award in Computing Sciences.

Probing the Whole Internet For Weak Spots
From ACM TechNews

Probing the Whole Internet For Weak Spots

When the FREAK encryption flaw was uncovered in early March, a team of researchers used a special tool to scan the entire Internet to identify vulnerable websites...

After Snowden, the Nsa Faces Recruitment Challenge
From ACM Careers

After Snowden, the Nsa Faces Recruitment Challenge

Daniel Swann is exactly the type of person the National Security Agency would love to have working for it.

­.s. Supreme Court: Gps Trackers Are a Form of Search and Seizure
From ACM News

­.s. Supreme Court: Gps Trackers Are a Form of Search and Seizure

If the government puts a GPS tracker on you, your car, or any of your personal effects, it counts as a search—and is therefore protected by the Fourth Amendment...

The Healing Power of Your Own Medical Records
From ACM News

The Healing Power of Your Own Medical Records

Steven Keating's doctors and medical experts view him as a citizen of the future.

Dump ­ser Names, Says Dartmouth Research
From ACM TechNews

Dump ­ser Names, Says Dartmouth Research

A joint academic and industry research team has found that two-factor authentication schemes depending on user names and passwords are inherently flawed. 

Germanwings Flight 9525, Technology, and the Question of Trust
From ACM Opinion

Germanwings Flight 9525, Technology, and the Question of Trust

Shortly before the dreadful crash of Germanwings Flight 9525, I happened to be reading part of "The Second Machine Age," a book by two academics at M.I.T., Erik...

Does Your Password Pass Muster?
From ACM TechNews

Does Your Password Pass Muster?

New research raises concerns about the effectiveness of password strength meters, the bars that turn red, yellow, or green to rate the strength of new passwords...

Hoax-Detecting Software Spots Fake Papers
From ACM TechNews

Hoax-Detecting Software Spots Fake Papers

Software programs that generate nonsense computer science papers have become sources of embarrassment for major academic publishers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account