acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Facebook Funds New AI Ethics Institute at Technical ­niversity of Munich
From ACM TechNews

Facebook Funds New AI Ethics Institute at Technical ­niversity of Munich

Facebook has teamed with the Technical University of Munich to establish an Institute of Ethics in Artificial Intelligence (AI), via a five-year, $7.5-million grant...

Flaws in Vendor Security Software Could Leave Some Federal Buildings Vulnerable
From ACM TechNews

Flaws in Vendor Security Software Could Leave Some Federal Buildings Vulnerable

Researchers found previously unknown vulnerabilities in some access control systems used by federal agencies.

Victoria to Allow Trial of Driverless Cars on Country Roads
From ACM TechNews

Victoria to Allow Trial of Driverless Cars on Country Roads

The state of Victoria in Australia has approved a trial of driverless cars on rural roads.

How Do You Govern Machines That Can Learn? Policymakers Are Trying to Figure That Out
From ACM TechNews

How Do You Govern Machines That Can Learn? Policymakers Are Trying to Figure That Out

Expert discussions on artificial intelligence took place last week in support potentially arrive at consensual recommendations for AI policy by the summer.

Washington Fears New Threat from 'Deepfake' Videos
From ACM News

Washington Fears New Threat from 'Deepfake' Videos

Lawmakers and experts are sounding the alarm about "deepfakes," forged videos that look remarkably real, warning they will be the next phase in disinformation campaigns...

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes
From ACM TechNews

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes

Security researchers attending the Pwn2Own CanSecWest security conference this March in Vancouver, Canada, will be incentivized to hack a Tesla Model 3 car.

FAA Proposes More Commercial Drone Operations at Night and Over People
From ACM TechNews

FAA Proposes More Commercial Drone Operations at Night and Over People

The U.S. Federal Aviation Administration has released preliminary rules to allow small drones to fly routinely over crowds of people at night.

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change
From ACM TechNews

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change

The World Economic Forum has listed large-scale cyberattacks and massive data breaches among the five most probable risks facing the world today.

Giving Algorithms a Sense of ­ncertainty Could Make Them More Ethical
From ACM News

Giving Algorithms a Sense of ­ncertainty Could Make Them More Ethical

Algorithms are increasingly being used to make ethical decisions. Perhaps the best example of this is a high-tech take on the ethical dilemma known as the trolley...

Venture Capitalists Balk at Proposed Export Limits on AI, Quantum Computing
From ACM TechNews

Venture Capitalists Balk at Proposed Export Limits on AI, Quantum Computing

Venture capitalists are warning the Trump administration against limiting exports on emerging technologies like artificial intelligence and quantum computing.

Oxford Suspends Research Grants From Huawei Over Security Concerns
From ACM TechNews

Oxford Suspends Research Grants From Huawei Over Security Concerns

Security concerns have prompted Oxford University in the U.K. to sever ties with Huawei.

How Do You Fight an Algorithm You Cannot See?
From ACM TechNews

How Do You Fight an Algorithm You Cannot See?

Activists in Germany have facilitated a method to assess the accountability of proprietary algorithms via a crowdsourcing platform.

Hackers Are Stealing Computer Power to Make Millions in Cryptocurrency
From ACM TechNews

Hackers Are Stealing Computer Power to Make Millions in Cryptocurrency

Groups of hackers are stealing millions of dollars through cryptojacking, which works by illicitly harnessing the computing power of thousands to mine cryptocurrency...

Proof-of-Concept Malware Reveals Smart Building Vulnerabilities
From ACM TechNews

Proof-of-Concept Malware Reveals Smart Building Vulnerabilities

Researchers warn smart building-targeting malware is the next step in the rapidly expanding attack surface made vulnerable by automated systems.

Trump's Immigration Policy Has Foreign Tech Talent Looking North of the Border
From ACM TechNews

Trump's Immigration Policy Has Foreign Tech Talent Looking North of the Border

President Trump has promised to reduce the number of H-1B visas granted; Canadian businesses see an opportunity to lure international tech talent north of the border...

Mobile Providers at Center of Privacy Storm
From ACM News

Mobile Providers at Center of Privacy Storm

Major wireless providers are facing new scrutiny into their privacy practices after a bombshell report sparked a public outcry and questions from lawmakers.

A DNS Hijacking Wave Is Targeting Companies at an Almost ­nprecedented Scale
From ACM TechNews

A DNS Hijacking Wave Is Targeting Companies at an Almost ­nprecedented Scale

Federal authorities and private researchers are warning companies about a wave of domain hijacking attacks.

­niversity of California Tells Students Not to ­se WeChat, WhatsApp in China
From ACM TechNews

­niversity of California Tells Students Not to ­se WeChat, WhatsApp in China

The University of California has warned students and faculty against using messaging apps and social media while visiting China.

A Neural Network Can Learn to Organize the World It Sees Into Concepts, Just Like We Do
From ACM News

A Neural Network Can Learn to Organize the World It Sees Into Concepts, Just Like We Do

GANs, or generative adversarial networks, are the social-media starlet of AI algorithms. They are responsible for creating the first AI painting ever sold at an ...

AI vs. the Hackers
From ACM TechNews

AI vs. the Hackers

Microsoft, Google, Amazon, and various startups increasingly are implementing machine learning algorithms that adapt to hackers' constantly evolving tactics.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account