acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


New ­tsa Study Describes Method to Detect Dishonesty Online
From ACM TechNews

New ­tsa Study Describes Method to Detect Dishonesty Online

A new study describes a method for detecting people dishonestly posting online content across multiple accounts.

The Stakes Are Rising in Google's Antitrust Fight With Europe
From ACM Careers

The Stakes Are Rising in Google's Antitrust Fight With Europe

Google is locked in a six-year battle with Europe's antitrust officials. And the stakes for both sides are getting higher.

You Are Less Anonymous on the Web Than You Think--Much Less
From ACM TechNews

You Are Less Anonymous on the Web Than You Think--Much Less

A user's anonymous browsing history, tweets, emails, and cookies can be used to piece together their identity.

Your Home's Online Gadgets Could Be Hacked By ­ltrasound
From ACM News

Your Home's Online Gadgets Could Be Hacked By ­ltrasound

This may have happened to you. You idly browse a pair of shoes online one morning, and for the rest of the week, those shoes follow you across the Internet, appearing...

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping
From ACM News

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping

Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect their messages from a third AI, which was trying...

Precise Quantum Cloning: Possible Pathway to Secure Communication
From ACM TechNews

Precise Quantum Cloning: Possible Pathway to Secure Communication

Researchers from The Australian National University and University of Queensland have produced near-perfect clones of quantum information.

Computer Scientist Ross Tate Working to Tame Java 'wildcards'
From ACM TechNews

Computer Scientist Ross Tate Working to Tame Java 'wildcards'

Cornell University professor Ross Tate has discovered that the Java programming language, designed to be safe, is actually quite insecure.

The FCC Just Passed Sweeping New Rules to Protect Your Online Privacy
From ACM News

The FCC Just Passed Sweeping New Rules to Protect Your Online Privacy

Federal officials delivered a landmark ruling in favor of online privacy Thursday, limiting how Internet providers use and sell customer data, while asserting that...

Your Dvr Didn't Take Down the Internet, Yet
From ACM News

Your Dvr Didn't Take Down the Internet, Yet

Last week ended with a mid-level internet catastrophe. You may have noticed that for most of Friday popular sites like Netflix, Twitter, Spotify (and yes, WIRED)...

Massive Cyberattack Poses Policy Dilemma, Stanford Scholar Says
From ACM TechNews

Massive Cyberattack Poses Policy Dilemma, Stanford Scholar Says

Last week's cyberattack that affected several prominent websites reveals weaknesses in the Internet of Things that need to be addressed.

Twitter's 'firehose' of Tweets Is Incredibly Valuable, and Just as Dangerous
From ACM News

Twitter's 'firehose' of Tweets Is Incredibly Valuable, and Just as Dangerous

There are half a billion tweets a day. For the company, they’re sellable data. For despots, they’re a great way to hunt dissidents.

The Pentagon's 'terminator Conundrum': Robots That Could Kill on Their Own
From ACM TechNews

The Pentagon's 'terminator Conundrum': Robots That Could Kill on Their Own

The Pentagon has made artificial intelligence the core of its agenda to maintain the U.S. position as the world's leading military power.

Study Finds 'lurking Malice' in Cloud Hosting Services
From ACM TechNews

Study Finds 'lurking Malice' in Cloud Hosting Services

Up to 10% of the repositories held by cloud hosting services have been compromised, according to a newly released study.

The Pentagon's 'terminator Conundrum': Robots That Could Kill on Their Own
From ACM News

The Pentagon's 'terminator Conundrum': Robots That Could Kill on Their Own

The small drone, with its six whirring rotors, swept past the replica of a Middle Eastern village and closed in on a mosque-like structure, its camera scanning...

Creating 3D Hands to Keep ­S Safe and Increase Security
From ACM TechNews

Creating 3D Hands to Keep ­S Safe and Increase Security

Researchers say without a lifelike three-dimensional model to test and calibrate fingerprint scanners, there is no consistent way to determine their accuracy. 

Typing While Skyping Could Compromise Privacy
From ACM TechNews

Typing While Skyping Could Compromise Privacy

Researchers have found a security breach in which keystroke sounds can be recorded during a Skype voice or video call and later reassembled as text.

Webcams ­sed to Attack Reddit and Twitter Recalled
From ACM News

Webcams ­sed to Attack Reddit and Twitter Recalled

Chinese electronics firm Hangzhou Xiongmai issued the recall soon after its cameras were identified as aiding the massive web attacks.

Designing the Future Internet
From ACM TechNews

Designing the Future Internet

Connecting many smart objects to the Internet will result in an enormous boost in online traffic, which one researcher aims to make manageable with a network redesign...

Here's How Young People Decide When They're Drunk 'enough,' According to Math
From ACM TechNews

Here's How Young People Decide When They're Drunk 'enough,' According to Math

Mathematical models developed by engineers at Ohio State University have enabled colleagues to explain the factors that drive alcohol consumption among young people...

A New Era of Internet Attacks Powered By Everyday Devices
From ACM News

A New Era of Internet Attacks Powered By Everyday Devices

When surveillance cameras began popping up in the 1970s and '80s, they were welcomed as a crime-fighting tool, then as a way to monitor traffic congestion, factory...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account