acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Facebook Experiment Helps Battle Man-in-the-Middle Attacks
From ACM TechNews

Facebook Experiment Helps Battle Man-in-the-Middle Attacks

Researchers at Facebook and Carnegie Mellon University have adapted a detection tool for man-in-the-middle attacks for Facebook. 

Some Predictions About the Internet of Things and Wearable Tech From Pew Research
From ACM News

Some Predictions About the Internet of Things and Wearable Tech From Pew Research

Remember the prediction that one day your oven would be connected to the Internet and have the ability to talk to your car?

Estonian Electronic Voting System Vulnerable to Attacks, Researchers Say
From ACM TechNews

Estonian Electronic Voting System Vulnerable to Attacks, Researchers Say

Estonia's electronic voting system cannot guarantee fair elections because of fundamental security weaknesses and poor operations procedures.

It's Judgment Day For Killer Robots at the ­nited Nations
From ACM TechNews

It's Judgment Day For Killer Robots at the ­nited Nations

The United Nations on Tuesday began its first-ever multinational convention on "lethal autonomous weapons systems." 

When Driverless Cars Crash, Who's to Blame?
From ACM News

When Driverless Cars Crash, Who's to Blame?

Self-driving cars have an undeniable allure: Think of all the fun things you could do if you didn't have to keep your eyes on the road!

What Is the 'right to Be Forgotten'?
From ACM News

What Is the 'right to Be Forgotten'?

Sixteen years ago, a Spaniard named Mario Costeja Gonzalez had hit financial difficulties.

Hackers Devise Wireless Methods For Stealing Atm Users' Pins
From ACM News

Hackers Devise Wireless Methods For Stealing Atm Users' Pins

Pilfering the personal identification numbers of financial accounts, a potential jackpot for hackers, is tougher to pull off thanks to data encryption and other...

World's First Covert Communications System With Camouflage Guaranteed
From ACM TechNews

World's First Covert Communications System With Camouflage Guaranteed

Researchers say they have developed a method to camouflage messages in a way that is mathematically guaranteed.

It's Judgment Day For Killer Robots at the ­nited Nations
From ACM News

It's Judgment Day For Killer Robots at the ­nited Nations

Has the age of the Robocop and Terminator arrived?

A Synthetic Biology Conference Lures an Intriguing Audience
From ACM News

A Synthetic Biology Conference Lures an Intriguing Audience

When does a scientific conference warrant the attention of the Federal Bureau of Investigation and the Department of Homeland Security?

Your Digital Trail Follows You to the Border
From ACM News

Your Digital Trail Follows You to the Border

Information, money and jobs flow easily around the world, yet it’s getting tougher for travelers to cross some borders.

The Military Thinks Bitcoin Could Pose a Threat to National Security
From ACM News

The Military Thinks Bitcoin Could Pose a Threat to National Security

Does Bitcoin risk endangering the nation's safety? The Pentagon thinks it might.

How Anybody Can Measure Your Computer's Wi-Fi Fingerprint
From ACM TechNews

How Anybody Can Measure Your Computer's Wi-Fi Fingerprint

Computer security experts have discovered a method of uniquely identifying a computer by the way it accesses Wi-Fi resources. 

Tim Berners-Lee: World Wide Web Magna Carta By 2015
From ACM TechNews

Tim Berners-Lee: World Wide Web Magna Carta By 2015

World Wide Web founder and inventor Sir Tim Berners-Lee has again called for a Magna Carta for the Internet. 

Molecular, Neural and Bacterial Networks Provide Insights For Computer Network Security, Carnegie Mellon Researchers Find
From ACM TechNews

Molecular, Neural and Bacterial Networks Provide Insights For Computer Network Security, Carnegie Mellon Researchers Find

The robust defenses yeast cells have evolved to protect themselves from environmental threats can be used to design computer networks. 

Former Head of the Nsa and Commander of the ­S Cyber Command, General Keith Alexander
From ACM Opinion

Former Head of the Nsa and Commander of the ­S Cyber Command, General Keith Alexander

Recently retired director of the U.S. National Security Agency and commander of the U.S. Cyber Command General Keith Alexander was interviewed by Australian Financial...

We're Saved! Experts Show How to Fix U.s. Cybersecurity
From ACM TechNews

We're Saved! Experts Show How to Fix U.s. Cybersecurity

A recent large-scale simulation attempted to gauge the ability of the U.S. to enact legislation to address cyber vulnerabilities following a national crisis. 

The Plug-and-Play Luxury Home
From ACM News

The Plug-and-Play Luxury Home

When it is completed in early 2018, Muse, a 49-story luxury-condo development in Sunny Isles Beach, Fla., will have an automated parking system with push-button...

National Day of Civic Hacking Widens Reach in Second Year
From ACM TechNews

National Day of Civic Hacking Widens Reach in Second Year

The National Day of Civic Hacking this year will broaden its scope to 79 international cities and 98 civic hacking events from May 31 to June 1. 

Eugene Kaspersky: Major Cyberterrorist Attack Is Only Matter of Time
From ACM Opinion

Eugene Kaspersky: Major Cyberterrorist Attack Is Only Matter of Time

A major, global cyberterrorist attack has long been the stuff of fiction, the threat that a malevolent hacker could bring down businesses, sabotage power plants...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account