acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorIEEE Spectrum
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


E-Zpass Could Kickstart Smart Cities
From ACM News

E-Zpass Could Kickstart Smart Cities

Everyone likes the idea of a smart city. Traffic lights would automatically adjust to optimize traffic flow, you could find parking spaces without circling for...

A True Random-Number Generator Built From Carbon Nanotubes
From ACM TechNews

A True Random-Number Generator Built From Carbon Nanotubes

Researchers say they have built a true random number generator from a static random-access memory cell printed with a specialized carbon nanotube ink.

Robots Could Act as Ethical Mediators Between Patients and Caregivers
From ACM TechNews

Robots Could Act as Ethical Mediators Between Patients and Caregivers

Researchers hypothesize that robots that understand ethical issues would be able to observe interactions between patients and caregivers, and intervene when needed...

Google Plans to Demonstrate the Supremacy of Quantum Computing
From ACM TechNews

Google Plans to Demonstrate the Supremacy of Quantum Computing

Google researchers say they plan to demonstrate "quantum supremacy" by year's end.

We Know What You're Watching (even If It's Encrypted)
From ACM News

We Know What You're Watching (even If It's Encrypted)

I stand firm in the opinion that it's my basic, human right to binge-watch six hours of trashy detective shows on a Friday night with a silent phone in my lap and...

Deep Learning AI Listens to Machines For Signs of Trouble
From ACM News

Deep Learning AI Listens to Machines For Signs of Trouble

Driving your car until it breaks down on the road is never anyone's favorite way to learn the need for routine maintenance.

Nsa Can Legally Access Metadata of 25,000 Callers Based on a Single Suspect's Phone
From ACM News

Nsa Can Legally Access Metadata of 25,000 Callers Based on a Single Suspect's Phone

Despite changes to the law, the U.S. National Security Agency can still request metadata from tens of thousands of private phones if they are indirectly connected...

The Fuzzy Logic of Fleeing For Your Life
From ACM TechNews

The Fuzzy Logic of Fleeing For Your Life

A special session at the IEEE International Conference on Intelligence Transportation Systems dealt with intelligent pedestrian traffic and evacuation dynamics.

Researcher Hacks Self-Driving Car Sensors
From ACM TechNews

Researcher Hacks Self-Driving Car Sensors

Laser-ranging (lidar) systems that most self-driving cars use to detect obstacles can be hacked by a setup costing about $60.

Fbi Wants Better Automated Image Analysis For Tattoos
From ACM TechNews

Fbi Wants Better Automated Image Analysis For Tattoos

The U.S. Federal Bureau of Investigation collaborated with the U.S. National Institute of Standards and Technology to find a better way to search for matching tatoos...

Malware Could Steal Data From Iphones ­sing Siri
From ACM TechNews

Malware Could Steal Data From Iphones ­sing Siri

A security vulnerability in the iPhone 5 series of smartphone could be exploited by malicious software and compromise a user's personal information via Siri.

To Foil Cyberattacks, Connected Cars Need Overlapping Shields
From ACM TechNews

To Foil Cyberattacks, Connected Cars Need Overlapping Shields

Smart cars will need many more layers of cyberprotection than automakers believe is necessary.

Introducing the Vacuum Transistor: A Device Made of Nothing
From ACM News

Introducing the Vacuum Transistor: A Device Made of Nothing

In September 1976, in the midst of the Cold War, Victor Ivanovich Belenko, a disgruntled Soviet pilot, veered off course from a training flight over Siberia in...

Quantum Cryptography With Ordinary Equipment
From ACM TechNews

Quantum Cryptography With Ordinary Equipment

Japanese researchers have proposed an approach to quantum cryptography they say could work with commercially available equipment. 

The Highs and Hazards of Bitcoin
From ACM News

The Highs and Hazards of Bitcoin

Bitcoin, the leading online alternative currency, has attracted high-minded entrepreneurs and crooks alike.

Scrambled Code Keeps Software Safe
From ACM TechNews

Scrambled Code Keeps Software Safe

Computer scientists have developed a "mathematical obfuscation" scheme to prevent hackers from reverse-engineering software. 

Hardware Trick Could Keep Cloud Data Safe
From ACM TechNews

Hardware Trick Could Keep Cloud Data Safe

The new Ascend chip could protect data in the cloud by concealing the way in which central processing units request information in cloud servers. 

Nanoscale Chip Design Enables Future 'internet of Things'
From ACM News

Nanoscale Chip Design Enables Future 'internet of Things'

With each passing day we are becoming more intertwined into the Internet of Things, where each and every object in the world—your clothes closet and every article...

The Biometric Wallet
From ACM TechNews

The Biometric Wallet

Hitachi and Fujitsu have pioneered a new technique in which a person's vein configurations are scanned as proof of identity, and the technology is being integrated...

The Future of Riots
From ACM News

The Future of Riots

On 6 August, peaceful protests over the police shooting of a local man in London's Tottenham district exploded into full-blown riots. During four days of assaults...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account