The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Security researchers warn that the techniques used in sophisticated, state-supported malware are being used by less-skilled programmers to target Web users.
Researchers at Purdue University and Adobe Advanced Technology Labs have developed a program that automatically adds strength to objects before they are printed.
This month, Intel unveiled a Wi-Fi radio almost completely made of the same sort of transistors that go into one of its microprocessors.
NASA's rover Curiosity touched a Martian rock with its robotic arm for the first time on Sept. 22, assessing what chemical elements are in the rock called "Jake Matijevic."
Facebook is working with a controversial data company called Datalogix that can track whether people who see ads on the social networking site end up buying those products in stores.
Facebook on Friday confronted a new obstacle over what to do with one of its most vital assets—pictures.
Open the bubble wrap on a new PC and the one thing you don't expect to find is preloaded malware.
Head of Iran's Civil Defense Organization Brigadier General Gholam Reza Jalali stressed that Iranian experts and engineers are fully capable of detecting and repelling enemies' cyber attacks against Iran's nuclear facilities…
Iran plans to switch its citizens onto a domestic Internet network in what officials say is a bid to improve cyber security but which many Iranians fear is the latest way to control their access to the Web.
A number of Internet service providers, including Comcast Corp. and Verizon Communications Inc., have recently upped the maximum speeds of broadband they offer residential customers to as much as 305 megabits per second.
Several organizations are developing technologies that can prevent falsehoods from spreading on the Internet.
University of Texas at Dallas researchers have developed "space travel," a technique that automatically enables one computer in a virtual network to monitor another for intrusions, viruses, or other malicious programs.
Tech companies like Google, Facebook and Zynga are on a shopping spree. They're buying small startups with innovative products and apps. But, many times, the tech giants don't care about what the small companies were producing…
Intel researchers recently demonstrated their NTV technology by operating an x86 microprocessor on just two milliwatts of power.
UNSW researchers say they have created the first working quantum bit based on a single atom in silicon, which could lead to the development of ultra-powerful computers.
Many colleges and universities are developing advanced degree programs in analytics to manage big data.
You know that scene in the film Contact where the "Machine" is spooling up, its three spinning rings kicking out crazy light and an electromagnetic field powerful enough to pitch nearby Navy battleships sideways, as Ellie (Jodie…
Imagine every thousandth blood cell in your body has a tiny radio transmitter in it.
The U.S. National Institute of Standards and Technology recently unveiled a laboratory designed to demonstrate that a typical suburban home for a family of four can generate as much energy as it uses in a year.
Giving computer programs the ability to educate students like a personal tutor is the goal of Worcester Polytechnic Institute professor Neil Heffernan, whose efforts have yielded ASSISTments, a program that helps students learn…
Although 538 million of China's 1.3 billion people had access to the Internet as of June 2012, most of the country's population is still offline, which led Chinese researchers to develop new technology they say revolutionizes…
India's Center for Development of Advanced Computing has drafted a proposal for developing a range of petaflop and exaflop computers over five years.
The Iranian government reportedly has established a technical platform for a national online network that would exist independent of the Internet and allow for tighter information regulation.
Intercepting thousands of phone calls is easy for government agencies. But quickly analyzing the calls and identifying the callers can prove a difficult task.
Everyone knows how easy it is to recognize a friend or family member from their walk—even from a distance.
As good as surveillance technology has gotten at some tasks, computers still frequently fail when it comes to figuring out the difference between a threat and a tumbleweed.
Long envisioned as an alternative to remembering scores of computer passwords or lugging around keys to cars, homes and businesses, technology that identifies people by their faces or other physical features finally is gaining…
Java developers can more easily build apps for the iPhone and iPad using a new open source command-line tool released by Google.
A new Flame malware report suggests that the malware's command-and-control interface was made to manage at least four different types of malware, meaning that there may be at least three more pieces of malware from Flame's creators…
University of Oregon researchers have developed a method to reproduce the structure and thermodynamic qualities of large, multiscale systems at variable levels of molecular coarse-graining.