acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


With California's Red Light Cameras, Are Pictures Admissible Evidence?
From ACM News

With California's Red Light Cameras, Are Pictures Admissible Evidence?

Carmen Goldsmith was driving her BMW through Inglewood, a Los Angeles suburb, when she ran a red light.

Physicists Are Building an Nsa-Proof Internet
From ACM News

Physicists Are Building an Nsa-Proof Internet

It's long been the Holy Grail of communications: technology that not only maximizes privacy, but also reveals when a message had been intercepted or copied.

Vint Cerf: CS Changes Needed To Address Iot Security, Privacy
From ACM Opinion

Vint Cerf: CS Changes Needed To Address Iot Security, Privacy

The Internet of Things has tremendous potential but also poses a tremendous risk if the underlying security of Internet of Things devices is not taken into account...

NSA Performed Warrantless Searches on Americans' Calls and Emails
From ACM TechNews

NSA Performed Warrantless Searches on Americans' Calls and Emails

The U.S. National Security Agency has performed warrantless searches of its databases to obtain data from Americans' phone calls and emails. 

While Warning of Chinese Cyberthreat, ­.s. Launches Its Own Attack
From ACM Opinion

While Warning of Chinese Cyberthreat, ­.s. Launches Its Own Attack

The U.S. government has long complained about Chinese hacking and cyberattacks, but new documents show that the National Security Agency managed to penetrate the...

Fact or Fiction?: Your Car Is Hackable
From ACM News

Fact or Fiction?: Your Car Is Hackable

When your home computer is hacked, the things at risk are your identity, finances and other digital assets.

Microsoft Builds a Digital 'monkey' to Hunt Fraudulent Ads
From ACM TechNews

Microsoft Builds a Digital 'monkey' to Hunt Fraudulent Ads

Researchers have developed technology, known as a digital monkey, that can detect and counter fraudulent advertisements on a large scale. 

Pay with Your Fingerprint
From ACM News

Pay with Your Fingerprint

Anyone with an iPhone 5 can use its fingerprint reader to unlock the device and pay for apps or music in Apple's iTunes store.

How Gmail Happened: The Inside Story of Its Launch 10 Years Ago Today
From ACM News

How Gmail Happened: The Inside Story of Its Launch 10 Years Ago Today

If you wanted to pick a single date to mark the beginning of the modern era of the web, you could do a lot worse than choosing Thursday, April 1, 2004, the day...

Experts Say Nsa Rules Leave Privacy Vulnerable
From ACM TechNews

Experts Say Nsa Rules Leave Privacy Vulnerable

Cybersecurity experts doubt U.S. President Barack Obama's assurance the U.S. National Security Agency is not spying on ordinary Americans' communications.

Nsa Infiltrated Rsa Security More Deeply Than Thought  Study
From ACM News

Nsa Infiltrated Rsa Security More Deeply Than Thought Study

Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's...

Open Enigma Project Makes Encryption Machines Accessible
From ACM News

Open Enigma Project Makes Encryption Machines Accessible

Enigma machines have captivated everyone from legendary code breaker Alan Turing and the dedicated cryptographers from England's Bletchley Park to historians and...

Search For Lost Jet Is Complicated By Geopolitics and Rivalries
From ACM News

Search For Lost Jet Is Complicated By Geopolitics and Rivalries

The frantic hunt for Malaysia Airlines Flight 370 has been, in one way, a nearly miraculous display of international collaboration: 26 nations, many of them rivals...

How the Nsa Would Get Phone Data ­nder Obama Administration's New Plan
From ACM News

How the Nsa Would Get Phone Data ­nder Obama Administration's New Plan

One of the key points in the "fact sheet" that the White House published today about its plan to end the NSA's bulk collection of phone record data is that while...

Consortium Wants Standards For 'internet of Things'
From ACM News

Consortium Wants Standards For 'internet of Things'

Attention: Internet of Things. For better or worse, big boys are in the room.

Justice Scalia Looks Forward to Hearing Nsa Spying Case
From ACM News

Justice Scalia Looks Forward to Hearing Nsa Spying Case

Justice Antonin Scalia signaled during a law school talk on March 21 that the Supreme Court is very much aware that legal challenges to the National Security Agency's...

Don't Let Personal Data Escape Your Smartphone
From ACM TechNews

Don't Let Personal Data Escape Your Smartphone

Ecole Polytechnique Federale de Lausanne researchers have developed an application that automatically secures shared information on a mobile phone. 

All Android Devices at Risk of Being Hacked When Installing Os System ­pdates
From ACM TechNews

All Android Devices at Risk of Being Hacked When Installing Os System ­pdates

Security researchers have uncovered a new class of vulnerabilities in the Android operating system. 

­niversity of Twente Tool Makes Scanning the Internet For Illegal Images Possible
From ACM TechNews

­niversity of Twente Tool Makes Scanning the Internet For Illegal Images Possible

A new system makes it possible to scan Internet traffic for illegal photographs without infringing on users' privacy rights. 

DARPA to Mine 'big Code' to Improve Software Reliability
From ACM TechNews

DARPA to Mine 'big Code' to Improve Software Reliability

The U.S. Defense Advanced Research Projects Agency seeks to address the software defects that underlie most system errors and security vulnerabilities.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account