acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Time's Running Out to Prevent a Massive Cyberattack on Critical Infrastructure
From ACM TechNews

Time's Running Out to Prevent a Massive Cyberattack on Critical Infrastructure

The U.S. National Infrastructure Advisory Council warns there is a shrinking window of opportunity to fortify critical U.S. infrastructure against a massive "9/11...

New York ­niversity Abu Dhabi Researchers Develop 'unhackable' Computer Chip
From ACM TechNews

New York ­niversity Abu Dhabi Researchers Develop 'unhackable' Computer Chip

Researchers say they have created an "unhackable" computer chip to boost the defenses of computer hardware.

Broadband to Mars
From Communications of the ACM

Broadband to Mars

Scientists are demonstrating that lasers could be the future of space communication.

Turing Laureates Celebrate Award's 50<sup>th</sup> Anniversary
From Communications of the ACM

Turing Laureates Celebrate Award's 50th Anniversary

ACM recently held a conference in celebration of the first 50 years of the ACM A.M. Turing Award.

Charles W. Bachman
From Communications of the ACM

Charles W. Bachman: 1924-2017

An engineer best known for his work in database management systems, and in techniques of layered architecture that include Bachman diagrams.

A Hunt For Ways to Combat Online Radicalization
From ACM Opinion

A Hunt For Ways to Combat Online Radicalization

Law enforcement officials, technology companies and lawmakers have long tried to limit what they call the "radicalization" of young people over the internet.

Watch Hackers Hijack Three Robots For Spying and Espionage
From ACM News

Watch Hackers Hijack Three Robots For Spying and Espionage

The entire corpus of science fiction has trained humanity to fear the day when helpful household and industrial robots turn against it, in a Skynet-style uprising...

Print No Evil: Three-Layer Technique Helps Secure Additive Manufacturing
From ACM TechNews

Print No Evil: Three-Layer Technique Helps Secure Additive Manufacturing

Researchers have developed a three-layer system for validating that components produced via additive manufacturing have not been compromised.

End of the Checkout Line: The Looming Crisis For American Cashiers
From ACM Careers

End of the Checkout Line: The Looming Crisis For American Cashiers

The day before a fully automated grocery store opened its doors in 1939, the inventor Clarence Saunders took out a full page advertisement in the Memphis Press-Scimitar...

Tracing the Sources of Today's Russian cyberthreat
From ACM Opinion

Tracing the Sources of Today's Russian cyberthreat

Beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military...

Spotting a Social Bot Might Be Harder Than You Think
From ACM TechNews

Spotting a Social Bot Might Be Harder Than You Think

Although savvy Internet users might think they can easily identify a social media bot, there are tricks a "bot army master" can use to make the accounts seem more...

Follow the Bitcoin to Find Victims of Human Trafficking
From ACM TechNews

Follow the Bitcoin to Find Victims of Human Trafficking

Researchers say they have developed the first automated techniques to identify ads potentially tied to human trafficking rings and link them to public information...

Killer Robots: World&#8217;s Top AI and Robotics Companies Urge United Nations to Ban Lethal Autonomous Weapons
From ACM News

Killer Robots: World’s Top AI and Robotics Companies Urge United Nations to Ban Lethal Autonomous Weapons

An open letter by leaders of leading robotics and artificial intelligence companies is released as the United Nations delays meeting to discuss the robot arms race...

E-Zpass Could Kickstart Smart Cities
From ACM News

E-Zpass Could Kickstart Smart Cities

Everyone likes the idea of a smart city. Traffic lights would automatically adjust to optimize traffic flow, you could find parking spaces without circling for...

How Secure Are Your Messages?
From ACM TechNews

How Secure Are Your Messages?

Researchers at Brigham Young University have found most users of Facebook Messenger, What'sApp, and the Viber messaging apps leave themselves open to fraud or other...

The Imperfect Crime: How the Wannacry Hackers Could Get Nabbed
From ACM News

The Imperfect Crime: How the Wannacry Hackers Could Get Nabbed

When hackers unleashed the WannaCry "ransomware" in mid-May, not only did they wreak havoc on European hospitals, telecoms and railways, they also made off with...

First Evidence That Social Bots Play a Major Role in Spreading Fake News
From ACM TechNews

First Evidence That Social Bots Play a Major Role in Spreading Fake News

Researchers say they have proof that social bots are the key to the online proliferation of fake news.

China's Plan For World Domination in AI Isn't So Crazy After All
From ACM Careers

China's Plan For World Domination in AI Isn't So Crazy After All

Xu Li's software scans more faces than maybe any on earth. He has the Chinese police to thank.

A True Random-Number Generator Built From Carbon Nanotubes
From ACM TechNews

A True Random-Number Generator Built From Carbon Nanotubes

Researchers say they have built a true random number generator from a static random-access memory cell printed with a specialized carbon nanotube ink.

Biohackers Encoded Malware in a Strand of Dna
From ACM News

Biohackers Encoded Malware in a Strand of Dna

When biologists synthesize DNA, they take pains not to create or spread a dangerous stretch of genetic code that could be used to create a toxin or, worse, an infectious...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account