acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Your Face

Imagine being able to sit down in a bar, snap a few photos of people, and quickly learn who they are, who their friends are, where they live, what kind of music...

Costly Drone Is Poised to Replace ­-2 Spy Plane
From ACM News

Costly Drone Is Poised to Replace ­-2 Spy Plane

Tucked away here in the Mojave Desert, the assembly plant for the high-flying Global Hawk jet resembles a giant hobby shop. Work tables surround a handful of...

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls
From ACM News

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls

What do you do when the target you’re spying on slips behind his home-security gates and beyond your reach? Launch your personal, specially equipped WASP drone—short...

Can Video Kill the Credit-Card Form?
From ACM News

Can Video Kill the Credit-Card Form?

The days of tediously having to punch in credit-card details whenever you make an online purchase may be numbered, thanks to a new payment system that turns any...

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future
From ACM News

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future

Ever since Google announced that its Android phones would be equipped with a "digital wallet" that allows users to pay for things simply by touching their phone...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...

From ACM News

Operation Shady RAT May Be the Biggest Hack in History but Is No Surprise

Anybody involved in the IT and cybersecurity industry knows that every major industry and government agency around the world is under threat of intrusion through...

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems
From ACM News

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems

A security researcher has uncovered a slew of vulnerabilities in Siemens industrial control systems, including a hard-coded password, that would let attackers...

Mapping the Most Complex Object in the Known ­niverse
From ACM News

Mapping the Most Complex Object in the Known ­niverse

It's paint-by-numbers for neuroscientists. At the Max-Planck Institute for Medical Research in Heidelberg, Germany, researchers have devised a faster way of computing...

Major Breakthrough Claimed in Wireless Technology
From ACM News

Major Breakthrough Claimed in Wireless Technology

Dropped calls, unsent texts, painfully slow Internet connections and overcrowded Wi-Fi hot spots have become a bane of modern life. But veteran valley entrepreneur...

From ACM News

Pentagon Seeks a Few Good Social Networkers

The Pentagon is developing plans to use social networking sites like Facebook and Twitter as both a resource and a weapon in future conflicts. Its research and...

Meet Dark Tangent, the Hacker Behind Black Hat and Def Con
From ACM News

Meet Dark Tangent, the Hacker Behind Black Hat and Def Con

The word "hacker" evokes all kinds of scary images. But Jeff Moss says hackers are exactly what the world needs more of, because they can make the Internet safer...

David Ferrucci, Lead Researcher of Ibm's Watson Project
From ACM News

David Ferrucci, Lead Researcher of Ibm's Watson Project

How do you improve on a computer that beat the world's best Jeopardy! players? Have Watson team up with humanity.

A New Planning Tool Helps Direct Traffic on Aircraft Carriers
From ACM News

A New Planning Tool Helps Direct Traffic on Aircraft Carriers

On the deck of an aircraft carrier, where up to 60 aircraft are crammed into 4.5 acres (1.8 hectares), real estate is at a premium. While aircraft directors wave...

Why Math Works
From ACM News

Why Math Works

Most of us take it for granted that math works—that scientists can devise formulas to describe subatomic events or that engineers can calculate paths for space­craft...

Can Microsoft Make You 'bing'?
From ACM News

Can Microsoft Make You 'bing'?

Mike Nichols has a poster on his office wall. It shows the young Muhammad Ali glaring down at a fallen Sonny Liston, the bruising heavyweight who had seemed invincible...

Researchers Expose Cunning Online Tracking Service That Can
From ACM News

Researchers Expose Cunning Online Tracking Service That Can

Researchers at U.C. Berkeley have discovered that some of the net's most popular sites are using a tracking service that can't be evaded—even when users block...

Here's How U.s. Spies Will Find You Through Your Pics
From ACM News

Here's How U.s. Spies Will Find You Through Your Pics

Iarpa, the intelligence community’s way-out research shop, wants to know where you took that vacation picture over the Fourth of July. It wants to know where...

From ACM News

­s. And Them.

Someone types a command into a laptop, and Actroid-DER jerks upright with a shudder and a wheeze. Compressed air flows beneath silicone skin, triggering actuators...

Someday Your Brain Could Brake For You
From ACM News

Someday Your Brain Could Brake For You

Many high-end cars today come equipped with brake assist systems, which help a driver use the brakes correctly depending on particular conditions in an emergency...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account