acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


French Election Is Facebook's Fake News Litmus Test
From ACM News

French Election Is Facebook's Fake News Litmus Test

In the run-up to the first round of the French presidential election, the country's social media was awash in press reports of dubious origin.

The Pentagon's Seek-and-Destroy Mission For Counterfeit Electronics
From ACM News

The Pentagon's Seek-and-Destroy Mission For Counterfeit Electronics

The Pentagon has known for years that a significant number of the replacement parts it buys for its missile guidance and satellite systems contain substandard counterfeit...

Spyware That Can Identify What Films You Are Watching
From ACM TechNews

Spyware That Can Identify What Films You Are Watching

New neural network-based detection algorithms can determine what movies people who use streaming services are viewing.

The Next Era of Drones Will Be Defined By 'swarms' 
From ACM News

The Next Era of Drones Will Be Defined By 'swarms' 

What do you picture when you think of a drone?

How the ­pdate Framework Improves Security of Software ­pdates
From ACM TechNews

How the ­pdate Framework Improves Security of Software ­pdates

New York University professor Justin Cappos has been developing The Update Framework (TUF) for eight years to help organizations update their software securely....

Geeks V Government: The Battle Over Public Key Cryptography
From ACM News

Geeks V Government: The Battle Over Public Key Cryptography

Two graduate students stood silently beside a lectern, listening as their professor presented their work to a conference.

Combating Cancer With Data
From Communications of the ACM

Combating Cancer With Data

Supercomputers will sift massive amounts of data in search of therapies that work.

Making Chips Smarter
From Communications of the ACM

Making Chips Smarter

Advances in artificial intelligence and machine learning are motivating researchers to design and build new chips to support different computing models.

Bionics in Competition
From Communications of the ACM

Bionics in Competition

Developers of innovative assistive devices compete as a means of networking with each other.

Cyber Threat Info Sharing Made Easier
From ACM TechNews

Cyber Threat Info Sharing Made Easier

The next iteration of the Structured Threat Information eXchange machine-to-machine cyberthreat information-sharing language is nearing completion.

Could the ­S Take Out North Korea's Missiles Before Launch?
From ACM News

Could the ­S Take Out North Korea's Missiles Before Launch?

A failed missile launch in North Korea Sunday has brought renewed attention to reports that the United States is trying to degrade North Korea's missile capabilities...

Scientists Develop a Novel Algorithm Inspired By Bee Colonies to Help Dismantling Criminal Social Networks
From ACM TechNews

Scientists Develop a Novel Algorithm Inspired By Bee Colonies to Help Dismantling Criminal Social Networks

Researchers have developed an algorithm designed to counter both physical and virtual threats to social networks.

Locking Out the Hackers
From ACM News

Locking Out the Hackers

New hardware, services are aimed at identifying malware before it has the chance to execute.

The Dark Secret at the Heart of AI
From ACM TechNews

The Dark Secret at the Heart of AI

Some experts warn deep-learning artificial intelligence technologies cannot be adopted without reservations if their creators cannot understand how they reason....

Supercomputer Simulation Offers Peek at the Future of Quantum Computers
From ACM TechNews

Supercomputer Simulation Offers Peek at the Future of Quantum Computers

Researchers from the Swiss Federal Institute of Technology Zurich in Switzerland have used the fifth-most powerful supercomputer in the world to simulate the behavior...

Your Phone's Power ­se Can Give Hackers an Opening
From ACM TechNews

Your Phone's Power ­se Can Give Hackers an Opening

Researchers have shown even without a data cable, hackers can analyze a device's power needs to access users' private information.

We Know What You're Watching (even If It's Encrypted)
From ACM News

We Know What You're Watching (even If It's Encrypted)

I stand firm in the opinion that it's my basic, human right to binge-watch six hours of trashy detective shows on a Friday night with a silent phone in my lap and...

An Algorithm That Hides Your Online Tracks With Random Footsteps
From ACM TechNews

An Algorithm That Hides Your Online Tracks With Random Footsteps

Steven Smith at MIT's Lincoln Laboratory has developed an algorithmic technique to thwart the collection of online users' browsing history. The algorithm conceals...

That Fingerprint Sensor on Your Phone Is Not as Safe as You Think
From ACM News

That Fingerprint Sensor on Your Phone Is Not as Safe as You Think

Fingerprint sensors have turned modern smartphones into miracles of convenience.

DARPA Will Bake Cybersecurity Into Circuits
From ACM TechNews

DARPA Will Bake Cybersecurity Into Circuits

DARPA this month plans to detail its System Security Integrated Through Hardware and Firmware program, with the goal of developing new integrated circuit architectures...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account