The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Facebook has repaired a security vulnerability discovered by Indiana University doctoral students Rui Wang and Zhou Li, which allowed malicious Web sites to find a visitor's real name, access their private data, and post misinformation…
The U.S. Defense Advanced Research Projects Agency (DARPA) recently launched the Cyber Fast Track program, which will reward security research done quickly and inexpensively, criteria designed to attract nontraditional developers…
University of Southampton researchers are developing RODIN, an open source software toolkit aimed at helping the embedded software industry to model and design products.
The NYPD is about to start using digital technology to match video images of people at crime scenes to mug shots on file, police sources said.
In the category "What Do You Know?," for $1 million: This four-year-old upstart the size of a small R.V. has digested 200 million pages of data about everything in existence and it means to give a couple of the world’s quickest…
More than a week after his mysterious disappearance in Egypt, Google executive and political activist Wael Ghonim will be released from government detention on Monday, according to his family and a prominent businessman.
The world needs cyber war "Rules of Engagement" to cope with potentially devastating cyber weapons, Russian and US experts will tell world leaders at a security conference on Friday.
Indiana University researchers have developed Soundminer, a smartphone Trojan Horse virus that can record and steal conversations, keypad sounds, credit card numbers, and bank account information. The researchers developed the…
The European Union's scientific and industrial innovation efforts lag far behind the United States and Japan, prompting the EU Commission to call for measures to promote private investment and greater business engagement in the…
Johns Hopkins University recently launched the Center for Advanced Modeling (CAM) in the Social, Behavioral and Health Sciences, which will focus on advanced computer simulation and modeling technology.
University of Wisconsin-Madison professor Azadeh Davoodi is studying solutions for timing errors, which are electronic bugs that can occur after a chip is fabricated and can cause components to slow and take longer to execute…
Like a prairie with no more vacant land to homestead or a hip area code with no more cellphone numbers, the pool of available numeric internet addresses has been completely allocated as of Thursday (.pdf).
The FIFA rule-making panel will study the results from 10 different goal-line technology systems being tested to help referees make decisions.
Gamers and hackers could control the office as well as games with Microsoft's Kinect.
Researchers at the universities of Southampton and Essex are working on the Photonics HyperHighway project, which aims to develop new technologies that can make broadband Internet 100 times faster.
Computer science pioneer Donald Knuth has released the "The Art of Computer Programming, Volume 4A, The Combinatorial Algorithms, Part 1," the first part of volume four of his seminal "Art of Computer Programming" book series…
NIST has issued the final version of its recommendations for securely configuring and using full computing virtualization technologies.
University of Maryland researchers recently made tiny integrated circuits using visible light, a major breakthrough that could allow computer manufacturers to make smaller, faster, and cheaper computer chips.
The U.S. Department of Homeland Security will invest $40 million on cybersecurity research areas in fiscal 2011 in support of the Comprehensive National Cyber Initiative.
Super Bowl attendees will experience impressive technology and some new mobile apps.
Asian registry snares last two address blocks, sparks automatic depletion of the free pool.
NIST has issued two new draft documents on cloud computing for public comment and set up a new NIST Cloud Computing Collaboration site to enable two-way communication on the topic.
Internet giant Google unveiled a new Website that allows virtual tours of some of the world's most famous art galleries.
The field of artificial intelligence (AI) is undergoing a revival, spurred by probabilistic programming that merges classic AI's logical principles with the power of statistics and probability.
Tel Aviv University researchers are developing a mathematical model to help new urban bike-sharing systems operate more efficiently. Bike-sharing systems have gained popularity in European cities and are being studied for potential…
Cyber Foundations is a cybersecurity competition for high school students launched by the U.S. Cyber Challenge and the SANS Institute. The contest will help identify students with the skills to pursue advanced education and…
University of Minnesota researchers have found that analyzing social networks can provide insight on aspects of social interactions, including the emergence or decline of leadership, changes in trust over time, and mobility within…
The Obama administration recently launched the Startup America initiative, which will involve government agencies and private-sector programs to train, mentor, and fund entrepreneurs, with the goal of improving high-growth entrepreneurship…
Before Egypt turned off the Internet, the country had received increasingly high marks from leading analysis firms as a promising offshore outsourcing destination, despite the nation's political risk.
The official government cybersecurity standards for the electric power grid fall far short of even the most basic security standards observed by noncritical industries, according to a new audit.