acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectCommunications / Networking
authorArs Technica
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


New Report Contends Mandatory Crypto Backdoors Would Be Futile
From ACM News

New Report Contends Mandatory Crypto Backdoors Would Be Futile

An estimated 63 percent of the encryption products available today are developed outside US borders, according to a new report that takes a firm stance against...

Europe's Top Court Mulls Legality of Hyperlinks to Copyrighted Content
From ACM News

Europe's Top Court Mulls Legality of Hyperlinks to Copyrighted Content

Europe's highest court is considering whether every hyperlink in a Web page should be checked for potentially linking to material that infringes copyright, before...

Models of Pedestrian Flow Stumble Because People Change Their Minds
From ACM News

Models of Pedestrian Flow Stumble Because People Change Their Minds

The flow of pedestrians is a critical part of the design of buildings, stadiums, and much more.

Star's Bizarre Optical Antics Go Back at Least a Century
From ACM News

Star's Bizarre Optical Antics Go Back at Least a Century

For over a century, a star's bizarre behavior has been hiding in plain sight.

Gene Editing Shows Promise in Treating Muscular Dystrophy
From ACM News

Gene Editing Shows Promise in Treating Muscular Dystrophy

Duchenne muscular dystrophy is one of the most common fatal genetic diseases. It causes muscle degeneration and eventually death due to weakened heart and lung...

In 2016, Terror Suspects and 7-Eleven Thieves May Bring Surveillance to Supreme Court
From ACM Opinion

In 2016, Terror Suspects and 7-Eleven Thieves May Bring Surveillance to Supreme Court

It has now been 2.5 years since the first Snowden revelations were published. And in 2015, government surveillance marched on in both large (the National Security...

Dutch Government: Encryption Good, Backdoors Bad
From ACM News

Dutch Government: Encryption Good, Backdoors Bad

The Dutch government has released a statement in which it says that "it is currently not desirable to take restricting legal measures concerning the development...

In 2015, Promising Surveillance Cases Ran Into Legal Brick Walls
From ACM Opinion

In 2015, Promising Surveillance Cases Ran Into Legal Brick Walls

Today, the first Snowden disclosures in 2013 feel like a distant memory.

Ipv6 Celebrates Its 20th Birthday By Reaching 10 Percent Deployment
From ACM News

Ipv6 Celebrates Its 20th Birthday By Reaching 10 Percent Deployment

Twenty years ago this month, RFC 1883 was published: Internet Protocol, Version 6 (IPv6) Specification.

Two Atoms Make Quantum Memory, Processing Gate, and Test of Entanglement
From ACM News

Two Atoms Make Quantum Memory, Processing Gate, and Test of Entanglement

Quantum systems are inherently fragile as any interactions with the outside world can change their state.

Backslash: Anti-Surveillance Gadgets For Protesters
From ACM Careers

Backslash: Anti-Surveillance Gadgets For Protesters

When riot police descended on protesters in Ferguson, Missouri, last year sporting assault rifles and armored vehicles, the images sparked an awareness of the military...

Attempt No Landing There? Yeah Right—We're Going to Europa
From ACM News

Attempt No Landing There? Yeah Right—We're Going to Europa

It is a nightmare glacier, tormented by the giant of our Solar System ever looming on its horizon.

MIT ­ses Wireless Signals to Identify People Through Walls
From ACM News

MIT ­ses Wireless Signals to Identify People Through Walls

MIT's Computer Science and Artificial Intelligence Lab is developing a device that uses wireless signals to identify human figures through walls.

Nsa Advisory Sparks Concern of Secret Advance ­shering in Cryptoapocalypse
From ACM News

Nsa Advisory Sparks Concern of Secret Advance ­shering in Cryptoapocalypse

In August, National Security Agency officials advised US agencies and businesses to prepare for a not-too-distant time when the cryptography protecting virtually...

How the Nsa Can Break Trillions of Encrypted Web and Vpn Connections
From ACM News

How the Nsa Can Break Trillions of Encrypted Web and Vpn Connections

For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic...

How Soviets ­sed IBM Selectric Keyloggers to Spy on ­S Diplomats
From ACM News

How Soviets ­sed IBM Selectric Keyloggers to Spy on ­S Diplomats

A National Security Agency memo that recently resurfaced a few years after it was first published contains a detailed analysis of what very possibly was the world's...

Europe's Highest Court Strikes Down Safe Harbor Data Sharing Between Eu, US
From ACM News

Europe's Highest Court Strikes Down Safe Harbor Data Sharing Between Eu, US

Europe's top court, the Court of Justice of the European Union (CJEU), has struck down the 15-year-old Safe Harbour agreement that allowed the free flow of information...

How the Nfl—not the Nsa—is Impacting Data Gathering Well Beyond the Gridiron
From ACM News

How the Nfl—not the Nsa—is Impacting Data Gathering Well Beyond the Gridiron

As guards were going so far as to check inside NFL fans' wallets as part of routine security measures before a recent preseason game at Levi's Stadium, a different...

Reflective Satellites May Be the Future of High-End Encryption
From ACM News

Reflective Satellites May Be the Future of High-End Encryption

Quantum key distribution is regularly touted as the encryption of the future. While the keys are exchanged on an insecure channel, the laws of physics provide a...

Robokiller Wins Ftc Prize By Annihilating Robocalls
From ACM Careers

Robokiller Wins Ftc Prize By Annihilating Robocalls

A new technology called "RoboKiller" has won a $25,000 grand prize from the Federal Trade Commission in the agency's "Robocalls: Humanity Strikes Back" contest...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account