acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectHuman Computer Interaction
authorThe Guardian
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Software that Tracks People on Social Media Created By Defence Firm
From ACM News

Software that Tracks People on Social Media Created By Defence Firm

A multinational security firm has secretly developed software capable of tracking people's movements and predicting future behaviour by mining data from social...

Google Report Reveals Continued Rise in ­.S. Government Requests for Data
From ACM News

Google Report Reveals Continued Rise in ­.S. Government Requests for Data

Google has revealed the full scale of the U.S. government's use of controversial legislation that bypasses judicial approval to access the online information of...

North Korean Students Show Google Chief How They Search Web
From ACM News

North Korean Students Show Google Chief How They Search Web

Students at North Korea's premier university have showed Google's executive chairman how they look for information online: they Google it.

Who Owns the Content You ­pload Online?
From ACM Opinion

Who Owns the Content You ­pload Online?

The outrage over Instagram's announcement that it is changing its terms and conditions has turned the spotlight on the relationship between websites and users who...

Everyone Wants a Slice of Raspberry Pi
From ACM News

Everyone Wants a Slice of Raspberry Pi

It's 9am on a lovely autumn morning at Cern, the European Organisation for Nuclear Research, just outside Geneva.

Google and Microsoft ­nder Threat from the March of the Mobiles
From ACM News

Google and Microsoft ­nder Threat from the March of the Mobiles

We're used to the idea of "peak oil"—that there's only a finite amount of that stuff in the ground. What's the equivalent in the computing field?

Who Controls the Internet?
From ACM News

Who Controls the Internet?

Have you ever noticed that wherever you are in the world, every telephone keypad looks the same? Or wondered why satellites don't crash into each other? Or why...

Anonymous: Behind the Masks of the Cyber Insurgents
From ACM News

Anonymous: Behind the Masks of the Cyber Insurgents

Spalding railway station in Lincolnshire is not a big place. It takes me about two seconds to scan the platform and spot who I'm looking for: Jake Davis, aka Topiary...

­.s. ­rged to Recruit Master Hackers to Wage Cyber War on Al-Qaida
From ACM News

­.s. ­rged to Recruit Master Hackers to Wage Cyber War on Al-Qaida

Instead of prosecuting elite computer hackers, the U.S. government should recruit them to launch cyber-attacks against Islamist terrorists and other foes, according...

What Is an Internet Troll?
From ACM News

What Is an Internet Troll?

I'm sitting waiting for the House of Commons to start debating a Law Against Trolls or, as they would call it, an amendment to the Defamation Act. It would basically...

Xbox at 10 in Europe: How the Console Shaped Gaming History
From ACM Opinion

Xbox at 10 in Europe: How the Console Shaped Gaming History

The games industry was a very different place 10 years ago. Still dominated by Japanese games and Japanese games machines, Microsoft's plans to launch its own dedicated...

Gchq Aims to Recruit Computer Hackers with Code-Cracking Web Site
From ACM Careers

Gchq Aims to Recruit Computer Hackers with Code-Cracking Web Site

Government intelligence service targets "self-taught" hackers with cryptic Web site that features no obvious branding.

From ACM News

Soft Robots Inspired By Nature Could Become Our Flexible Friends

Robbie the Robot in the 1950s movie Forbidden Planet may have been endearing in a clunky, metallic way, but negotiating tricky terrain was never his strong point...

To Stop Cybercrime We Need to Think Like the Criminals
From ACM News

To Stop Cybercrime We Need to Think Like the Criminals

Whenever William Hague, our esteemed foreign secretary, speaks on the subject of cyberspace, what comes to mind is Dr Johnson’s celebrated comment about seeing...

Governments Turn to Hacking Techniques For Surveillance of Citizens
From ACM News

Governments Turn to Hacking Techniques For Surveillance of Citizens

In a luxury Washington, D.C., hotel last month, governments from around the world gathered to discuss surveillance technology they would rather you did not know...

Did Android Copy Ios? We Asked Google's Product Manager...
From ACM Opinion

Did Android Copy Ios? We Asked Google's Product Manager...

Has Android copied elements from Apple's iOS? It's not a matter that Google's senior managers for the Android operating system want to get involved in.

From ACM News

Diginotar Ssl Certificate Hack Amounts to Cyberwar, Says Expert

The Dutch government says hackers who broke into a web security firm in the Netherlands last month issued hundreds of bogus security certificates that could be...

From ACM Opinion

Why Google Had to Have Motorola Mobility

For several years now, Google has been following a vow made by former CEO Eric Schmidt: mobile first. New CEO Larry Page is taking that dictum to a new level...

MI5 Joins Social Messaging Trawl for Riot Organisers
From ACM News

MI5 Joins Social Messaging Trawl for Riot Organisers

Intelligence agency asked to crack encrypted messages—especially on BlackBerry Messenger—to help police.

David Cameron Considers Banning Suspected Rioters from Social Media
From ACM News

David Cameron Considers Banning Suspected Rioters from Social Media

David Cameron has told parliament that in the wake of this week's riots the government is looking at banning people from using social networking sites, such as...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account