acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How Police Trace Cellphones in Ieds Like the Ones in Nyc
From ACM News

How Police Trace Cellphones in Ieds Like the Ones in Nyc

A cellphone makes a convenient detonator for an improvised explosive device. But it's also one of the most conveniently trackable devices under the eye of American...

How the Fbi Could Have Hacked the San Bernardino Shooter's Iphone
From ACM News

How the Fbi Could Have Hacked the San Bernardino Shooter's Iphone

More than six months have passed since the FBI first ordered Apple to help the agency bypass the encryption on the iPhone 5c of Rizwan Syed Farook, an ISIS supporter...

How Space Scientists Turn Exoplanets Into Places We Can 'see'
From ACM News

How Space Scientists Turn Exoplanets Into Places We Can 'see'

Do a Google image search for "exoplanet."

AI Can Recognize Your Face Even If You're Pixelated
From ACM News

AI Can Recognize Your Face Even If You're Pixelated

Pixelation has long been a familiar fig leaf to cover our visual media’s most private parts.

Google's Clever Plan to Stop Aspiring Isis Recruits
From ACM News

Google's Clever Plan to Stop Aspiring Isis Recruits

Google has built a half-trillion-dollar business out of divining what people want based on a few words they type into a search field.

This AI Software Can Tell If You're at Risk From Cancer Before Symptoms Appear
From ACM TechNews

This AI Software Can Tell If You're at Risk From Cancer Before Symptoms Appear

Artificial intelligence software developed by researchers at the Houston Methodist Research Institute in Texas can accurately predict breast cancer risk.

Forget Software: Now Hackers Are Exploiting Physics
From ACM News

Forget Software: Now Hackers Are Exploiting Physics

Practically every word we use to describe a computer is a metaphor.

Linux Took Over the Web. Now, It’s Taking Over the World
From ACM News

Linux Took Over the Web. Now, It’s Taking Over the World

The roots of Linux stretch all the way back to the creation of Unix at AT&T’s Bell Labs in 1969.

The Shadow Brokers Mess Is What Happens When the Nsa Hoards Zero-Days
From ACM News

The Shadow Brokers Mess Is What Happens When the Nsa Hoards Zero-Days

When the NSA discovers a new method of hacking into a piece of software or hardware, it faces a dilemma.

Ironic Windows Vulnerability Shows Why Backdoors Can't Work
From ACM News

Ironic Windows Vulnerability Shows Why Backdoors Can't Work

Apple's refusal to comply with a court order to help the FBI crack an iPhone highlighted the pressure tech companies face to include backdoors in their software...

A New Wireless Hack Can Unlock 100 Million Volkswagens
From ACM News

A New Wireless Hack Can Unlock 100 Million Volkswagens

In 2013, when University of Birmingham computer scientist Flavio Garcia and a team of researchers were preparing to reveal a vulnerability that allowed them todelayed...

Martians Might Be Real. That Makes Mars Exploration Way More Complicated
From ACM News

Martians Might Be Real. That Makes Mars Exploration Way More Complicated

History will note that the guy who discovered liquid water on Mars was an undergraduate at the University of Arizona, a 20-year-old who played guitar in a death...

Hackers Hijack a Big Rig Truck's Accelerator and Brakes
From ACM News

Hackers Hijack a Big Rig Truck's Accelerator and Brakes

When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles' brakes or hijack their steering...

America's Electronic Voting Machines Are Scarily Easy Targets
From ACM News

America's Electronic Voting Machines Are Scarily Easy Targets

This week, GOP presidential candidate Donald Trump openly speculated that this election would be "rigged." Last month, Russia decided to take an active role in...

How To Fool AI Into Seeing Something That Isn't There
From ACM News

How To Fool AI Into Seeing Something That Isn't There

Our machines are littered with security holes, because programmers are human.

Radio Hack Steals Keystrokes from Millions of Wireless Keyboards
From ACM News

Radio Hack Steals Keystrokes from Millions of Wireless Keyboards

You should be able to trust your wireless keyboard.

Snowden Designs a Device to Warn If Your Iphone's Radios Are Snitching
From ACM News

Snowden Designs a Device to Warn If Your Iphone's Radios Are Snitching

When Edward Snowden met with reporters in a Hong Kong hotel room to spill the NSA's secrets, he famously asked them put their phones in the fridge to block any...

Europe Is Going After Google Hard, and Google May Not Win
From ACM News

Europe Is Going After Google Hard, and Google May Not Win

Microsoft pulled the strings. At least, that’s what Google and so many business and tech journalists said when the search giant first faced antitrust complaints...

Apple's New App Will Teach the Next Generation How to Code
From ACM TechNews

Apple's New App Will Teach the Next Generation How to Code

Apple's new Swift Playgrounds iPad application is designed to teach novices how to code, using the Swift programming language with their mobile devices.

Clever Tool Shields Your Car From Hacks By Watching Its Internal Clocks
From ACM News

Clever Tool Shields Your Car From Hacks By Watching Its Internal Clocks

Car-hacking demonstrations tend to get all the glory in the security research community—remotely paralyzing a Jeep on the highway or cutting a Corvette’s brakes...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account