acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges
From ACM Careers

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges

Def Con is one of the world's biggest hacker conventions, an annual gathering of security experts, cryptographers and at least a few people who could surreptitiously...

Watch This Wireless Hack Pop a Car's Locks in Minutes
From ACM News

Watch This Wireless Hack Pop a Car's Locks in Minutes

Shims and coat hangers are the clumsy tools of last century's car burglars.

Why the Security of ­sb Is Fundamentally Broken
From ACM TechNews

Why the Security of ­sb Is Fundamentally Broken

At this week’s Black Hat security conference, security researchers will present a new proof-of-concept malware that exploits a fundamental flaw in the USB format...

Nasa Validates 'impossible' Space Drive
From ACM News

Nasa Validates 'impossible' Space Drive

NASA is a major player in space science, so when a team from the agency this week presents evidence that "impossible" microwave thrusters seem to work, something...

Finally, a Way to Teach Coding to the Touchscreen Generation
From ACM News

Finally, a Way to Teach Coding to the Touchscreen Generation

First came Generation X. Then the Millennials. And if you have kids under 10, you already know what they're going to be called: the Touchscreen Generation.

The Weird Reasons Why People Make ­p False Identities on the Internet
From ACM Opinion

The Weird Reasons Why People Make ­p False Identities on the Internet

Sockpuppetry—using false identities for deception—is centuries old, but the advent of the web has made creating sockpuppets, and falling for their tricks, easier...

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud
From ACM News

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud

Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing...

The Moral Hazards and Legal Conundrums of Our Robot-Filled Future
From ACM Opinion

The Moral Hazards and Legal Conundrums of Our Robot-Filled Future

The robots are coming, and they're getting smarter.

Inside the Artificial Brain That's Remaking the Google Empire
From ACM News

Inside the Artificial Brain That's Remaking the Google Empire

It was one of the most tedious jobs on the Internet. A team of Googlers would spend day after day staring at computer screens, scrutinizing tiny snippets of street...

Why Apple's Swift Language Will Instantly Remake Computer Programming
From ACM News

Why Apple's Swift Language Will Instantly Remake Computer Programming

Chris Lattner spent a year and a half creating a new programming language—a new way of designing, building, and running computer software—and he didn't mention...

How Google Map Hackers Can Destroy a Business at Will
From ACM Careers

How Google Map Hackers Can Destroy a Business at Will

Washington DC-area residents with a hankering for lion meat lost a valuable source of the (yes, legal) delicacy last year when a restaurant called the Serbian Crown...

Scientists Create a New Type of Ultra-High-Res Flexible Display
From ACM News

Scientists Create a New Type of Ultra-High-Res Flexible Display

We are surrounded by imperfect screens.

The Next Big Programming Language You've Never Heard Of
From ACM TechNews

The Next Big Programming Language You've Never Heard Of

The success of D, a programming language some see as the successor to C++, has surprised even its creators.

The ­ltra-Simple App That Lets Anyone Encrypt Anything
From ACM News

The ­ltra-Simple App That Lets Anyone Encrypt Anything

Encryption is hard.

Machines Finally Match Monkeys in Key Image-Recognition Test
From ACM News

Machines Finally Match Monkeys in Key Image-Recognition Test

There are so many ways that humans are still superior to machines.

Could Color Wheels Make For Easier, More Secure Passwords?
From ACM News

Could Color Wheels Make For Easier, More Secure Passwords?

The password as we know it is in critical condition.

Researchers Find and Decode the Spy Tools Governments ­se to Hijack Phones
From ACM TechNews

Researchers Find and Decode the Spy Tools Governments ­se to Hijack Phones

A study of tools used by law enforcment and intelligence agencies to conduct surveillance on computer and mobile phone users revealed a wide range of functions. ...

This Is What Math Equations Look Like in 3-D
From ACM News

This Is What Math Equations Look Like in 3-D

The doors to MIT are always unlocked.

Google Glass Snoopers Can Steal Your Passcode With a Glance
From ACM TechNews

Google Glass Snoopers Can Steal Your Passcode With a Glance

Newly developed software uses video from wearable devices such as Google Glass and smartwatches to read PIN codes typed onto an iPad from almost 10 feet away.

Researchers Find and Decode the Spy Tools Governments ­se to Hijack Phones
From ACM News

Researchers Find and Decode the Spy Tools Governments ­se to Hijack Phones

Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account