acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Steganography: How Al-Qaeda Hid Secret Documents in a Porn Video
From ACM News

Steganography: How Al-Qaeda Hid Secret Documents in a Porn Video

When a suspected al-Qaeda member was arrested in Berlin in May of 2011, he was found with a memory card with a password-protected folder—and the files within it...

London 2012: The Importance of Olympic Timekeeping
From ACM News

London 2012: The Importance of Olympic Timekeeping

Olympic timekeepers Omega are unveiling the latest technology that will be used at the London 2012 Games. It can monitor athletes' performance to the nearest one...

From ACM News

The Indoor Positioning System Era

GPS rules your life. At least, it rules mine.

Amateur Astronomers Scour the Sky For Government Secrets
From ACM News

Amateur Astronomers Scour the Sky For Government Secrets

Earlier this year Iran's defense minister put the world on notice: His nation had developed the ability to "easily" watch spacewalking astronauts from the ground...

Data Engineer in Google Case Is Identified
From ACM News

Data Engineer in Google Case Is Identified

At the center of the uproar over a Google project that scooped up personal data from potentially millions of unsuspecting people is the company software engineer...

'bullet Time' to Stop Cyber Attacks on Power Grids
From ACM News

'bullet Time' to Stop Cyber Attacks on Power Grids

In The Matrix, the famous "bullet time" effect showed how Keanu Reeves's character Neo was able to sway out of the path of incoming bullets, as time appeared to...

From ACM News

California Chosen as Home for Computing Institute

The Simons Foundation, which specializes in science and math research, has chosen the University of California, Berkeley, as host for an ambitious new center for...

Web War Ii: What a Future Cyberwar Will Look Like
From ACM News

Web War Ii: What a Future Cyberwar Will Look Like

How might the blitzkrieg of the future arrive? By air strike? An invading army? In a terrorist's suitcase? In fact it could be coming down the line to a computer...

Nhtsa Testing V2v Communication Systems, Considering Requiring Technology on New Cars
From ACM News

Nhtsa Testing V2v Communication Systems, Considering Requiring Technology on New Cars

The National Highway Transportation Safety Administration wants to ramp up the development and deployment of vehicle-to-vehicle communication systems, and the federal...

From ACM News

Smartphone Patent Wars: The Coming Sequel

Billions of dollars are being spent to amass patent arsenals, and lawsuits are flying worldwide.

Iranian Oil Ministry Discovers Hackers' Target
From ACM News

Iranian Oil Ministry Discovers Hackers' Target

The Iranian oil ministry's cyber team has identified the main and hidden agenda of the recent cyber attack on the ministry, a senior Iranian official announced...

Drone ­se Takes Off on the Home Front
From ACM News

Drone ­se Takes Off on the Home Front

With little public attention, dozens of universities and law-enforcement agencies have been given approval by federal aviation regulators to use unmanned aircraft...

Papers From Collective Intelligence 2012 Conference Now Online
From ACM TechNews

Papers From Collective Intelligence 2012 Conference Now Online

MIT recently hosted the Collective Intelligence 2012 conference, which gave collective intelligence experts an opportunity to review papers about behavior that...

From ACM News

The New Science of Online Persuasion

The Web has fundamentally changed the business of advertising in just a few years. So it stands to reason that the process of creating ads is bound to change, too...

Could Iran Wage a Cyberwar on the ­.s.?
From ACM News

Could Iran Wage a Cyberwar on the ­.s.?

Security professionals in both the U.S. government and in private industry have long feared the prospect of a cyberwar with China or Russia, two states capable...

The World's Five Biggest Cyber Threats
From ACM News

The World's Five Biggest Cyber Threats

Criminals do not stop at stealing someone's personal data.

What Will Nasa's Rover of the Future Look Like?
From ACM News

What Will Nasa's Rover of the Future Look Like?

NASA recently announced the formation of the Mars Program Planning Group, which—as its title would suggest—is aimed at getting us back to Mars. The hope is to get...

A Further Boost For Quantum Cryptography
From ACM TechNews

A Further Boost For Quantum Cryptography

Universidad Politecnica de Madrid researchers say they have developed an efficient information reconciliation technique for quantum key distribution that could...

Voyagers' Never-Ending Journey
From ACM News

Voyagers' Never-Ending Journey

Exploration is one thing, science another—but they've come together rather nicely in the Voyager mission to the outer planets, outbound for the past 35 years yet...

Nasa's Space Apps Competition Takes on Big Ideas
From ACM TechNews

Nasa's Space Apps Competition Takes on Big Ideas

The U.S. National Aeronautics and Space Administration recently held its first International Space Apps Challenge, attracting participants from 24 countries for...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account