acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Nasa Mohawk Guy Bobak Ferdowsi on Sci-Fi, Legos, and Becoming a Meme
From ACM Opinion

Nasa Mohawk Guy Bobak Ferdowsi on Sci-Fi, Legos, and Becoming a Meme

As space geeks watched nervously to see if NASA's Curiosity rover would land safely on Mars, many found themselves wondering, "Hey, who's that cool dude with the...

Robot Master
From ACM Opinion

Robot Master

When you visit Manuela Veloso at Carnegie Mellon University, you're not guided to her office by a security officer or even issued instructions by a secretary at...

Flame and Stuxnet Cousin Targets Lebanese Bank Customers, Carries Mysterious Payload
From ACM News

Flame and Stuxnet Cousin Targets Lebanese Bank Customers, Carries Mysterious Payload

A newly uncovered espionage tool, apparently designed by the same people behind the state-sponsored Flame malware that infiltrated machines in Iran, has been found...

Appeals Court Oks Warrantless Wiretapping
From ACM News

Appeals Court Oks Warrantless Wiretapping

The federal government may spy on Americans' communications without warrants and without fear of being sued, a federal appeals court ruled Tuesday in a decision...

How Apple and Amazon Security Flaws Led to My Epic Hacking
From ACM Opinion

How Apple and Amazon Security Flaws Led to My Epic Hacking

In the space of one hour, my entire digital life was destroyed.

Lasers, Cameras, and Particle Detectors: Mars Rover's Super High-Tech Science Gear
From ACM News

Lasers, Cameras, and Particle Detectors: Mars Rover's Super High-Tech Science Gear

Assuming it safely passes through its terrifying and complex descent sequence, NASA's newest rover, Curiosity, should get its wheels on the Martian surface in just...

Does Cybercrime Really Cost $1 Trillion?
From ACM News

Does Cybercrime Really Cost $1 Trillion?

Gen. Keith Alexander is the director of the National Security Agency and oversees U.S. Cyber Command, which means he leads the government's effort to protect America...

Apple v. Samsung: 5 Surprising Reveals in Latest Court Documents
From ACM News

Apple v. Samsung: 5 Surprising Reveals in Latest Court Documents

The lawyers behind the upcoming Apple v. Samsung trial have been hard at work filing docket after docket as their court battle looms closer, and many of those dockets...

Timing Is Everything For the Games' Chief Timer
From ACM Opinion

Timing Is Everything For the Games' Chief Timer

Timing is everything for Peter Hürzeler, a man for whom "good enough" simply isn't.

Xerox: ­h, We Didn't Invent the Internet
From ACM Opinion

Xerox: ­h, We Didn't Invent the Internet

Who invented the Internet?

Russia's Top Cyber Sleuth Foils ­S Spies, Helps Kremlin Pals
From ACM Opinion

Russia's Top Cyber Sleuth Foils ­S Spies, Helps Kremlin Pals

It's early February in Cancun, Mexico. A group of 60 or so financial analysts, reporters, diplomats, and cybersecurity specialists shake off the previous night's...

Study: Twitter Analysis Can Be Used to Detect Psychopathy
From ACM TechNews

Study: Twitter Analysis Can Be Used to Detect Psychopathy

Researchers at Florida Atlantic University, the Online Privacy Foundation, and Kaggle recently invited computer scientists to develop models that can identify psychopathy...

Will Wright Wants to Make a Game Out of Life Itself
From ACM Opinion

Will Wright Wants to Make a Game Out of Life Itself

For almost 30 years, Will Wright’s creations have attracted people who would never have played videogames. He's also managed the trick of developing games that...

Gps Hijacking Catches Feds, Drone Makers Off Guard
From ACM News

Gps Hijacking Catches Feds, Drone Makers Off Guard

On June 19, when University of Texas researchers successfully hijacked a drone by "spoofing" it— giving it bad GPS coordinates–they showed the Department of Homeland...

Newest U.s. Counterterrorism Strategy: Trolling
From ACM News

Newest U.s. Counterterrorism Strategy: Trolling

In the decade since 9/11, the U.S. government has used a wide variety of tactics against terrorists.

Study: Wikileaked Data Can Predict Insurgent Attacks
From ACM News

Study: Wikileaked Data Can Predict Insurgent Attacks

Insurgencies are amongst the hardest conflicts to predict. Insurgents can be loosely organized, split into factions, and strike from out of nowhere. But now researchers...

Mahdi, the Messiah, Found Infecting Systems in Iran, Israel
From ACM News

Mahdi, the Messiah, Found Infecting Systems in Iran, Israel

Who knew that when the Messiah arrived to herald the Day of Judgment he'd first root through computers to steal documents and record conversations?

Google Remakes Online Empire With 'Colossus'
From ACM News

Google Remakes Online Empire With 'Colossus'

More than a decade ago, Google built a new foundation for its search engine.

Computer Watches Humans Play Connect Four, Then Beats Them
From ACM News

Computer Watches Humans Play Connect Four, Then Beats Them

A computer scientist has published a paper detailing how systems can successfully win at boardgames after watching two minute-long videos of humans playing.

Drone Hijacking? That
From ACM News

Drone Hijacking? That

On the evening of June 19, a group of researchers from the University of Texas successfully hijacked a civilian drone at the White Sands Missile Range in New Mexico...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account