acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Perfect Communication With Imperfect Chips
From ACM TechNews

Perfect Communication With Imperfect Chips

Massachusetts Institute of Technology research affiliate Lav Varshney has shown that some of the most commonly used codes in telecommunications can guarantee the...

Why Has BlackBerry Been Blamed for the London Riots?
From ACM News

Why Has BlackBerry Been Blamed for the London Riots?

The whole of London is taking stock after outbreaks of violence and looting across the capital. Ealing, Camden, Peckham, Clapham, Lewisham, Woolwich, and Hackney...

From ACM News

Network Effects: Social Media's Role in the London Riots

Facebook and Twitter can fuel uprisings by allowing participants to coordinate action and to see themselves as part of a larger movement.

Sysadmin Day Goes Global
From ACM News

Sysadmin Day Goes Global

It’s not unusual for system administrators to spend long days in the office—and even wind up sleeping in them overnight. Or get paged at 2 A.M. or on Thanksgiving...

From ACM News

Web Tracking Has Become a Privacy Time Bomb

For more than a decade, tracking systems have been taking note of where you go and what you search for on the Web—without your permission. Today many of the personal...

Caltech-Led Engineers Solve Longstanding Problem in Photonic Chip Technology
From ACM TechNews

Caltech-Led Engineers Solve Longstanding Problem in Photonic Chip Technology

California Institute of Technology researchers have created a method to isolate light signals on a silicon chip, which they say could lead to the development of...

Above the Clouds: An Interview With Armando Fox
From ACM TechNews

Above the Clouds: An Interview With Armando Fox

University of California, Berkeley professor Armando Fox, co-founder of the Reliable, Adaptive, and Distributed Systems Laboratory, co-wrote a paper that outlined...

From ACM News

Black Hat: Legal Pitfalls of Investigating Mobile

Hackers today are testing mobile devices ever more strenuously, but the work often stands on shaky legal ground, according to Jennifer Granick, an attorney for...

From ACM News

Your Smartphone: A New Frontier For Hackers

Last week, security researchers uncovered yet another strain of malicious software aimed at smartphones that run Google's popular Android operating system. The...

From ACM News

Your Face

Imagine being able to sit down in a bar, snap a few photos of people, and quickly learn who they are, who their friends are, where they live, what kind of music...

European Security Group Issues Warning on HTML5
From ACM TechNews

European Security Group Issues Warning on HTML5

New standards under development as part of HTML5 neglect important security issues, according to a European Network and Information Security Agency (ENISA) report...

Georgia Tech Proposes Internet Consumer Nutrition Label
From ACM TechNews

Georgia Tech Proposes Internet Consumer Nutrition Label

A recent Georgia Tech University study of Internet service providers (ISPs) concluded that ISPs should provide easy-to-understand information about service-limiting...

Costly Drone Is Poised to Replace ­-2 Spy Plane
From ACM News

Costly Drone Is Poised to Replace ­-2 Spy Plane

Tucked away here in the Mojave Desert, the assembly plant for the high-flying Global Hawk jet resembles a giant hobby shop. Work tables surround a handful of...

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls
From ACM News

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls

What do you do when the target you’re spying on slips behind his home-security gates and beyond your reach? Launch your personal, specially equipped WASP drone—short...

Can Video Kill the Credit-Card Form?
From ACM News

Can Video Kill the Credit-Card Form?

The days of tediously having to punch in credit-card details whenever you make an online purchase may be numbered, thanks to a new payment system that turns any...

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future
From ACM News

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future

Ever since Google announced that its Android phones would be equipped with a "digital wallet" that allows users to pay for things simply by touching their phone...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...

From ACM News

Operation Shady RAT May Be the Biggest Hack in History but Is No Surprise

Anybody involved in the IT and cybersecurity industry knows that every major industry and government agency around the world is under threat of intrusion through...

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems
From ACM News

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems

A security researcher has uncovered a slew of vulnerabilities in Siemens industrial control systems, including a hard-coded password, that would let attackers...

China Aims to Renew Status As Scientific Superpower
From ACM News

China Aims to Renew Status As Scientific Superpower

China was probably the world's earliest technological superpower, inventing the plow, the compass, gunpowder, and block printing. Then, science in the Middle...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account