The news archive provides access to past news stories from Communications of the ACM and other sources by date.
University of Pennsylvania researchers have developed technology that helps make computer networks run more efficiently.
As many as 13 previously unknown vulnerabilities in home Wi-Fi routers and networked storage systems are set to be disclosed at the Black Hat computer security conference that kicks off in Las Vegas on Wednesday.
Sam Altman sits behind his desk with his knees pulled up to his chest, eating dried apricots.
Introducing computer science to students early in their educational careers will require teachers who are trained to teach it.
After a decade-long journey chasing its target, ESA's Rosetta has today become the first spacecraft to rendezvous with a comet, opening a new chapter in Solar System exploration.
Shims and coat hangers are the clumsy tools of last century's car burglars.
Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight entertainment systems—a claim that, if confirmed, could prompt…
The U.S. Defense Advanced Research Projects Agency is currently running five programs to improve civilian and military GPS navigation technology.
Researchers are working on a smartphone application to help older adults understand their health so they can cultivate healthier habits.
The U.S. National Science Foundation has announced two awards that will support projects addressing grand challenges in cybersecurity and computer science.
Researchers are developing information technology to boost the efficiency of water power generation systems.
There is much to get excited about computers when you consider all the things that go into PCs to make them faster, lighter, more powerful, and more convenient to use.
A Stanford University project uncovered a technique for wirelessly charging tiny devices implanted in the human body to treat illness and alleviate pain.
The scene in Blade Runner is famous: taking a grainy photo, Rick Deckard zooms, enhances and moves around corners just as you would a 3D space.
A new algorithm can reconstruct an audio signal by analyzing tiny vibrations of objects depicted in video.
Is a solution to one of the most important, beautiful and potentially lucrative problems in mathematics right around the corner?
After 10 years and four billion miles, the European Space Agency's Rosetta spacecraft will arrive at its destination on Wednesday for the first extended, close examination of a comet.
Google has taken on its fair share of ambitious projects—digitizing millions and millions of books, mapping the whole world, pioneering self-driving cars.
According to one professor, females' perception of information and communication technology is a key reason many women and girls do not enter the field.
Scalable Game Design, a program that teaches kids to code using video games, is being introduced into New York City public schools.
John Henry Skillern was arrested last Thursday for the possession of child pornography.
On 18 July, someone in the Russian government edited Wikipedia.
Anthropologist Genevieve Bell is vice president of Intel Labs, where she oversees a team dedicated to figuring out how technology is changing society, and vice versa.
As it approaches the second anniversary of its landing on Mars, NASA's Curiosity rover is also approaching its first close look at bedrock that is part of Mount Sharp, the layered mountain in the middle of Mars' Gale Crater.
Was the National Cryptologic Museum designed using a code of some kind?
PolyPasswordHasher is a new open source password protection scheme that could help organizations better protect passwords.
A new study found about 40 percent of 1,400 software developers worldwide are writing applications for Internet of Things-connected devices or intend to do so soon.
Scientists used a methodology modeled on the behaviors of injured animals to help a six-legged robot relearn how to walk once one or more of its legs were damaged.
At this week’s Black Hat security conference, security researchers will present a new proof-of-concept malware that exploits a fundamental flaw in the USB format.
For nearly a year, U.S. government officials have said revelations from former NSA contract worker Edward Snowden harmed national security and allowed terrorists to develop their own countermeasures.