acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectLegal Aspects
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Mapping the Bitcoin Economy Could Reveal Users' Identities
From ACM TechNews

Mapping the Bitcoin Economy Could Reveal Users' Identities

An analysis of the public log of Bitcoin digital currency transactions could enable law enforcement to pinpoint user identities. 

'spoofers' Use Fake Gps Signals to Knock a Yacht Off Course
From ACM News

'spoofers' Use Fake Gps Signals to Knock a Yacht Off Course

University of Texas researchers recently tricked the navigation system of an $80 million yacht and sent the ship off course in an experiment that showed how any...

More Connected Homes, More Problems
From ACM News

More Connected Homes, More Problems

As a growing number of Internet-connected home appliances hit the market, David Bryan and Daniel Crowley worry that digital ne'er-do-wells will get new ways to...

The Immortal Life of the Enron E-Mails
From ACM News

The Immortal Life of the Enron E-Mails

Former Enron executive Vincent Kaminski is a modest, semi-retired business school professor from Houston who recently wrote a 960-page book explaining the fundamentals...

Siri's Creators Demonstrate an Assistant That Takes the Initiative
From ACM News

Siri's Creators Demonstrate an Assistant That Takes the Initiative

In a small, dark, room off a long hallway within a sprawling complex of buildings in Silicon Valley, an array of massive flat-panel displays and video cameras track ...

Contact Lens Computer: Like Google Glass, Without the Glasses
From ACM News

Contact Lens Computer: Like Google Glass, Without the Glasses

For those who find Google Glass indiscreet, electronic contact lenses that outfit the user’s cornea with a display may one day provide an alternative.

Marketing to the Big Data Inside ­S
From ACM News

Marketing to the Big Data Inside ­S

Companies market to you according to your shopping habits, your age, your salary, and your social-media activities. In the future, they may be able to advertise...

What Will Hackers Do with the New Kinect?
From ACM Careers

What Will Hackers Do with the New Kinect?

Microsoft announced a new version of the Xbox One earlier this week, and with it an improved and essentially reinvented version of Kinect, the company's body- and...

From ACM News

How Today's Sensors Could Make Tomorrow's Cars Safer

Driverless cars haven’t hit the roads yet, but computers are already helping to slow down or stop a car in situations when a crash is imminent.

How Wireless Carriers Are Monetizing Your Movements
From ACM News

How Wireless Carriers Are Monetizing Your Movements

Wireless operators have access to an unprecedented volume of information about users' real-world activities, but for years these massive data troves were put to...

Interview with Brain Project Pioneer: Miyoung Chun
From ACM Opinion

Interview with Brain Project Pioneer: Miyoung Chun

Brain Research through Advancing Innovative Neurotechnologies (BRAIN) project, which President Obama announced in his State of the Union address in February, will...

Clues Suggest Malware Is Moving from Pcs to Mobile Devices
From ACM News

Clues Suggest Malware Is Moving from Pcs to Mobile Devices

The fact that smartphones and tablets don't need antivirus software or regular software updates is a major reason for their popularity.

Autopsy of a Dead Social Network
From ACM Careers

Autopsy of a Dead Social Network

Friendster is a social network that was founded in 2002, a year before Myspace and two years before Facebook.

Exposé of Chinese Data Thieves Reveals Sloppy Tactics
From ACM News

Exposé of Chinese Data Thieves Reveals Sloppy Tactics

A beige office block in Shanghai's suburbs belonging to the Chinese army became world famous on Tuesday after Mandiant, a Washington-based computer security company...

Welcome to the Malware-Industrial Complex
From ACM News

Welcome to the Malware-Industrial Complex

Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating...

Why China's Homemade Microchips Will Struggle to Displace Western Giants
From ACM Opinion

Why China's Homemade Microchips Will Struggle to Displace Western Giants

If China's ultimate aim in the sphere of technology is to become completely self-sufficient, it is well on the way to achieving this ambitious goal.

The Man Looking to Turn Samsung Into a Silicon Valley Trendsetter
From ACM Opinion

The Man Looking to Turn Samsung Into a Silicon Valley Trendsetter

Samsung Electronics is a company at the top of its game, having become the world’s leading smartphone manufacturer in the last year.

How to Steal Data from Your Neighbor in the Cloud
From ACM News

How to Steal Data from Your Neighbor in the Cloud

Cloud computing teaches people not to worry about physical equipment for hosting data and running software.

Why You Can't Vote Online Tuesday
From ACM News

Why You Can't Vote Online Tuesday

A decade and a half into the Web revolution, we do much of our banking and shopping online. So why can't we vote over the Internet? The answer is that voting presents...

The States with the Riskiest Voting Technology
From ACM News

The States with the Riskiest Voting Technology

Next Tuesday's presidential election will likely be extremely close, magnifying the potential impact of vote-counting errors.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account