acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Basic Password Guidance Can Dramatically Improve Account Security, Study Shows
From ACM TechNews

Basic Password Guidance Can Dramatically Improve Account Security, Study Shows

Researchers have found that technology users who receive basic password guidance are up to 40% more likely to make their password choices more secure.

Enigma: Up Close with a Nazi Cipher Machine
From ACM News

Enigma: Up Close with a Nazi Cipher Machine

A black metal mechanical device resembling a typewriter sits in a wooden box.

GitHub Hit With the Largest DDoS Attack Ever Seen
From ACM News

GitHub Hit With the Largest DDoS Attack Ever Seen

Distributed Denial of Service attackers have found a new way of magnifying their attacks, with experts warning that bigger attacks are likely.

Hacker-Resistant Power Plant Software Shows Real-World Results in Hawaii
From ACM TechNews

Hacker-Resistant Power Plant Software Shows Real-World Results in Hawaii

Researchers have developed an open source, intrusion-tolerant control system designed to keep power flowing even if part of the grid is compromised.

China's Internet ­nderground Fights for Its Life
From ACM News

China's Internet ­nderground Fights for Its Life

For years, thousands of virtual private networks (VPNs) have allowed people in China to circumvent restrictions on internet access and visit Facebook, Google, YouTube...

Why ­.S. 'Cyber-Warriors' Can't Do Anything About Russian 'Cyber-Meddling'
From ACM News

Why ­.S. 'Cyber-Warriors' Can't Do Anything About Russian 'Cyber-Meddling'

In testimony before the US Senate Armed Services Committee on Tuesday, National Security Agency Director and US Cyber Command Commander Admiral Michael Rogers told...

Private Browsing Gets More Private
From ACM TechNews

Private Browsing Gets More Private

The new Veil system is designed to improve private browsing by guaranteeing that any data the browser loads into memory remains encrypted until it is displayed...

Justices Struggle with ­.S. Demands for Overseas Data
From ACM News

Justices Struggle with ­.S. Demands for Overseas Data

The Supreme Court appeared to be divided Tuesday as it struggled to interpret whether a three-decade-old federal law gives the U.S. government the right to access...

Microsoft's Supreme Court Case Has Big Implications For Data
From ACM News

Microsoft's Supreme Court Case Has Big Implications For Data

Five years ago, US law enforcement served Microsoft a search warrant for emails as part of a US drug trafficking investigation. In response, Microsoft handed over...

Apple Moves to Store iCloud Keys in China, Raising Human Rights Fears
From ACM News

Apple Moves to Store iCloud Keys in China, Raising Human Rights Fears

When Apple Inc begins hosting Chinese users' iCloud accounts in a new Chinese data center at the end of this month to comply with new laws there, Chinese authorities...

­niversity Researcher ­nveils 'Creeper' Business Tool
From ACM TechNews

­niversity Researcher ­nveils 'Creeper' Business Tool

Creeper is a new software program designed to protect businesses against a cybersecurity threat known as "permissions creep."

Real-Time Captcha Technique Improves Biometric Authentication
From ACM TechNews

Real-Time Captcha Technique Improves Biometric Authentication

The Real-Time Captcha is a new login authentication approach designed to enhance the security of current biometric methods that rely on video or images of users'...

How ProPublica Became Big Tech’s Scariest Watchdog
From ACM News

How ProPublica Became Big Tech’s Scariest Watchdog

The nonprofit is fighting fire with fire, developing algorithms and bots that hold Facebook and Amazon accountable.

The Myth of the Hacker-Proof Voting Machine
From ACM News

The Myth of the Hacker-Proof Voting Machine

In 2011, the election board in Pennsylvania's Venango County—a largely rural county in the northwest part of the state—asked David A. Eckhardt, a computer science...

Researchers Have Finally Created a Tool to Spot Duplicated Images Across Thousands of Papers
From ACM News

Researchers Have Finally Created a Tool to Spot Duplicated Images Across Thousands of Papers

Computer software can now quickly detect duplicate images across large swathes of the research literature, three scientists say.

Noise Warfare
From ACM TechNews

Noise Warfare

Researchers at Harvard University have developed noise-robust classifiers against the worst case of added additional data that disrupts or skews information an...

Twitter Bars Tactics ­sed by 'Bots' to Spread False Stories
From ACM News

Twitter Bars Tactics ­sed by 'Bots' to Spread False Stories

Twitter Inc said on Wednesday it would no longer allow people to post identical messages from multiple accounts, cracking down on a tactic that Russian agents and...

The State of Fakery
From Communications of the ACM

The State of Fakery

How digital media could be authenticated, from computational, legal, and ethical points of view.

The Construction Industry in the 21st Century
From Communications of the ACM

The Construction Industry in the 21st Century

Three-dimensional printing and other new technologies are revitalizing the business of building buildings.

In Pursuit of Virtual Life
From Communications of the ACM

In Pursuit of Virtual Life

Scientists are simulating biological organisms and replicating evolution in the lab. How far can they expand the boundaries of virtual life?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account