acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectComputers And Society
authorTHE New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

From ACM News

Rise Is Seen in Cyberattacks Targeting ­.s. Infrastructure

The top American military official responsible for defending the United States against cyberattacks said Thursday that there had been a 17-fold increase in computer...

Silicon Valley Says Step Away From the Device
From ACM News

Silicon Valley Says Step Away From the Device

Stuart Crabb, a director in the executive offices of Facebook, naturally likes to extol the extraordinary benefits of computers and smartphones. 

One Course, 150,000 Students
From ACM TechNews

One Course, 150,000 Students

MIT professor Anant Agarwal recently completed teaching Circuits and Electronics, the first course in MITx, a massive open online learning platform from MIT, which...

The Drone Zone
From ACM News

The Drone Zone

Holloman Air Force Base, at the eastern edge of New Mexico's White Sands Missile Range, 200 miles south of Albuquerque, was once famous for the daredevil maneuvers...

A Northwest Pipeline to Silicon Valley
From ACM News

A Northwest Pipeline to Silicon Valley

Some budding entrepreneurs and computer whizzes based here in the Pacific Northwest are starting to turn heads down in Silicon Valley.

You For Sale: Mapping, and Sharing, the Consumer Genome
From ACM News

You For Sale: Mapping, and Sharing, the Consumer Genome

It knows who you are. It knows where you live. It knows what you do.

Verifying Ages Online Is a Daunting Task, Even For Experts
From ACM News

Verifying Ages Online Is a Daunting Task, Even For Experts

Just how hard can it be to verify the age of a person online?

Apple's Stash of Credit Card Numbers Is Its Secret Weapon
From ACM News

Apple's Stash of Credit Card Numbers Is Its Secret Weapon

That little iPhone in your pocket is perfectly positioned to become a clone of the credit cards in your wallet or purse.

Shots Fired, Pinpointed and Argued Over
From ACM News

Shots Fired, Pinpointed and Argued Over

 At 7:22:07 p.m. on a recent Thursday, an electronic alarm went off in the soundproof control room of a suburban office building here.

As Computing Changes, Hewlett-Packard Struggles to Follow
From ACM News

As Computing Changes, Hewlett-Packard Struggles to Follow

As the computer industry makes a radical shift to new modes of computing—in the cloud and on tablets and smartphones—Hewlett-Packard, a stalwart of the previous...

From ACM News

Troves of Personal Data, Forbidden to Researchers

When scientists publish their research, they also make the underlying data available so the results can be verified by other scientists.

The Education of Mark Zuckerberg
From ACM News

The Education of Mark Zuckerberg

Mark Zuckerberg is ready for his close-up.

How to Muddy Your Tracks on the Internet
From ACM News

How to Muddy Your Tracks on the Internet

Legal and technology researchers estimate that it would take about a month for Internet users to read the privacy policies of all the Web sites they visit in a...

Data Engineer in Google Case Is Identified
From ACM News

Data Engineer in Google Case Is Identified

At the center of the uproar over a Google project that scooped up personal data from potentially millions of unsuspecting people is the company software engineer...

Giving Women the Access Code
From ACM Careers

Giving Women the Access Code

When Maria Klawe became president of Harvey Mudd College in 2006, she was dismayed— but not surprised—at how few women were majoring in computer science.

Genius and Tragedy at Dawn of Computer Age
From ACM News

Genius and Tragedy at Dawn of Computer Age

One of the many myths about Apple is that the company's name is a reference to the half-eaten apple reportedly found beside the corpse of the British computer scientist...

The Soul of the New Hacktivist
From ACM News

The Soul of the New Hacktivist

In 1988, a Cornell graduate student, Robert Tappan Morris, let loose a computer worm on the fledgling version of the Internet. He said it was meant to be an experiment...

New Interest in Hacking as Threat to Security
From ACM News

New Interest in Hacking as Threat to Security

During the five-month period between October and February, there were 86 reported attacks on computer systems in the United States that control critical infrastructure...

Life on Mars? Funds to Find Answer Fade
From ACM News

Life on Mars? Funds to Find Answer Fade

Just as NASA is on the cusp of answering the most fascinating questions about Mars—is there, was there or could there be life there?—the money needed to provide...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account