acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Despite Data Thefts, the Password Endures
From ACM TechNews

Despite Data Thefts, the Password Endures

Efforts to replace passwords with better protections face an uphill battle.

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage
From ACM Opinion

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage

Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers...

'killer Robots': Are They Really Inevitable?
From ACM News

'killer Robots': Are They Really Inevitable?

The robot tank is moving rapidly through the scrub on its caterpillar tracks.

Electric Grid, You Have Software ­pdates Available
From ACM News

Electric Grid, You Have Software ­pdates Available

The electric grid was designed as a one-way highway, with power cascading out from big power plants to cities and towns at the end of the line.

General Agreement
From Communications of the ACM

General Agreement

Leslie Lamport contributed to the theory and practice of building distributed computing systems that work as intended.

Secrets, Lies and Snowden's Email: Why I Was Forced to Shut Down Lavabit
From ACM Opinion

Secrets, Lies and Snowden's Email: Why I Was Forced to Shut Down Lavabit

My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation...

Neuromorphic Computing Gets Ready For the (Really) Big Time
From Communications of the ACM

Neuromorphic Computing Gets Ready For the (Really) Big Time

A technology inspired by biological principles but 'steamrolled for decades' prepares to take off as Moore's Law approaches its long-anticipated end.

Wireless Camera Network Offers New Possibilities For Security Systems
From ACM TechNews

Wireless Camera Network Offers New Possibilities For Security Systems

The Solar Wi-Fi Energy Efficient Tracking camera system is a prototype device for a solar-powered wireless network of smart cameras. 

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?
From ACM Opinion

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?

There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...

Researchers Discover Critical Flaws in the Chip and Pin System
From ACM TechNews

Researchers Discover Critical Flaws in the Chip and Pin System

A pair of critical flaws in EMV smart card technology can be exploited to generate cloned cards that are undetectable by normal bank procedures. 

The Myths & Realities of How the Eu's New 'right To Be Forgotten' in Google Works
From ACM Opinion

The Myths & Realities of How the Eu's New 'right To Be Forgotten' in Google Works

Is it true that anyone in the EU can have anything removed from Google and other search engines?

For U.s. Companies That Challenge China, the Risk of Digital Reprisal
From ACM News

For U.s. Companies That Challenge China, the Risk of Digital Reprisal

Two large American steel makers, U.S. Steel and Allegheny Technologies, each lost confidential files giving access to their computer networks.

Fighting Off Virtual Attacks
From ACM TechNews

Fighting Off Virtual Attacks

Researchers say they have taken ideas from nature and applied them to security for software that runs on digital devices. 

New Algorithm Shakes ­p Cryptography
From ACM TechNews

New Algorithm Shakes ­p Cryptography

Researchers have uncovered a flaw in cryptography security, discrediting several cryptographic systems that were assumed to provide sufficient safeguards. 

"we're at Greater Risk": General Keith Alexander
From ACM Opinion

"we're at Greater Risk": General Keith Alexander

Since Edward Snowden's revelations about government surveillence, we know more about how the National Security Agency has been interpreting Section 215 of the Patriot...

Who Watches the Watchers? Big Data Goes ­nchecked
From ACM Opinion

Who Watches the Watchers? Big Data Goes ­nchecked

The National Security Agency might be tracking your phone calls. But private industry is prying far more deeply into your life.

More Google 'forget' Requests Emerge After Eu Ruling
From ACM News

More Google 'forget' Requests Emerge After Eu Ruling

A man who tried to kill his family is among the latest to request removal of search results from Google.

Computers See Your Face as a Child. Will They Recognize You as an Adult?
From ACM TechNews

Computers See Your Face as a Child. Will They Recognize You as an Adult?

Questions have emerged about whether facial recognition technology could recognize an adult based on images of that person as a child. 

Do We Need Asimov's Laws?
From ACM News

Do We Need Asimov's Laws?

In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...

After European Court Decision, Google Works on a Link Removal Tool
From ACM News

After European Court Decision, Google Works on a Link Removal Tool

Google will announce by the end of the month a mechanism for consumers to request that links to information about them be removed from the company’s search engine...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account