acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Self-Assembling Minirobots Swim and Manipulate Objects

Tiny, self-assembling robots can swim and clamp onto particles and then release them when subjected to the right magnetic fields.

Why Has BlackBerry Been Blamed for the London Riots?
From ACM News

Why Has BlackBerry Been Blamed for the London Riots?

The whole of London is taking stock after outbreaks of violence and looting across the capital. Ealing, Camden, Peckham, Clapham, Lewisham, Woolwich, and Hackney...

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls
From ACM News

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls

What do you do when the target you’re spying on slips behind his home-security gates and beyond your reach? Launch your personal, specially equipped WASP drone—short...

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems
From ACM News

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems

A security researcher has uncovered a slew of vulnerabilities in Siemens industrial control systems, including a hard-coded password, that would let attackers...

Researchers Expose Cunning Online Tracking Service That Can
From ACM News

Researchers Expose Cunning Online Tracking Service That Can

Researchers at U.C. Berkeley have discovered that some of the net's most popular sites are using a tracking service that can't be evaded—even when users block...

Here's How U.s. Spies Will Find You Through Your Pics
From ACM News

Here's How U.s. Spies Will Find You Through Your Pics

Iarpa, the intelligence community’s way-out research shop, wants to know where you took that vacation picture over the Fourth of July. It wants to know where...

From ACM News

Document: Fbi Surveillance Geeks Fear, Love New Gadgets

Can't wait for 4G to become the ubiquitous standard for mobile communication? On the edge of your seat for the unveiling of Microsoft's secret Menlo Project and...

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells
From ACM News

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells

Vulnerabilities in electronic systems that control prison doors could allow hackers or others to spring prisoners from their jail cells, according to researchers...

For 'creativity,' Just Add 'crowd'
From ACM TechNews

For 'creativity,' Just Add 'crowd'

Stevens Institute of Technology researcher Jeffery Nickerson is studying how to use crowdsourcing to produce creative ideas. 

From ACM News

Stanford

What better way to combine your nerdy loves of computer programming and Star Wars than with a robot that can actually battle with a light saber?

Why Brains Get Creeped Out By Androids
From ACM News

Why Brains Get Creeped Out By Androids

We've all found ourselves in the uncanny valley before. It's that uneasy feeling you get when viewing a realistic humanoid or CGI person that’s so close to looking...

From ACM News

DARPA Searches For Life

There’s a hidden clock that underlies every process of every living thing—from when our cells start dividing to how quickly we age. Researchers at Darpa, the...

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History
From ACM News

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

It was January 2010, and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz...

From ACM News

Spies Want to Mine Your Tweets For Signs of the Next Tsunami

The intelligence community has seen the future, and the future is Google Trends. Actually, more like a highly sophisticated version of Google Trends, with Twitter...

Killer Drones, Stealth Jets, Spy Planes: Bob Gates
From ACM News

Killer Drones, Stealth Jets, Spy Planes: Bob Gates

On his way out the door at the Pentagon, Robert Gates leveled with the military. A staggering $700 billion in defense R&D and gear since 9/11 led to only "...

Real ­.s. Stealth-Tech Advantage: Its Assembly Lines
From ACM News

Real ­.s. Stealth-Tech Advantage: Its Assembly Lines

For more than 20 years, the U.S. Air Force had a world monopoly on radar-evading technology—and with it, a huge advantage over any rival. Several generations...

Lady of the Rings: Saturn Surveyor Carolyn Porco
From ACM Opinion

Lady of the Rings: Saturn Surveyor Carolyn Porco

When Carolyn Porco started exploring the outer solar system, it was all about the rings. Her 1983 doctoral thesis at Caltech focused on shifting spokes in Saturn’s...

From ACM News

DARPA Crowdsources Interstellar Travel

Last August, a bunch of Star Wars fans pestered NASA about a timetable for building a hyperdrive engine. Maybe someone was listening. In May, the Defense Advanced...

How to Make a Clock Run For 10,000 Years
From ACM News

How to Make a Clock Run For 10,000 Years

High on a rocky ridge in the desert, nestled among 5,000-year-old bristlecone pines, is the topmost part of a clock that has been ticking for thousands of years...

From ACM TechNews

Nanomagnetic Computers Are the ­ltimate in Efficiency

Nanomagnetic computers would break the second law of thermodynamics if they used any less energy, according to new calculations from a team led by the University...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account