acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Real or Fake? Creating Fingers to Protect Identities
From ACM TechNews

Real or Fake? Creating Fingers to Protect Identities

Michigan State University researchers have designed and created a fake finger containing multiple properties of human skin.

3D-Printing Human Body Parts
From Communications of the ACM

3D-Printing Human Body Parts

Bioprinting has generated bones, cartilage, and some muscles; hearts and livers are still years away.

Robot Judges? Edmonton Research Crafting Artificial Intelligence For Courts
From ACM TechNews

Robot Judges? Edmonton Research Crafting Artificial Intelligence For Courts

University of Alberta professor Randy Goebel's team in Canada is working with researchers in Japan to develop artificial intelligence software for legal reasoning...

Portable Device Fears Show Power of Social Development
From Communications of the ACM

Portable Device Fears Show Power of Social Development

How do small screens impact young minds?

Some of the Best Parts of Autonomous Vehicles Are Already Here
From ACM News

Some of the Best Parts of Autonomous Vehicles Are Already Here

Fully automated cars are still many years away. Amid the government activity and potential for social benefits, it's important not to lose sight of smaller improvements...

How the Internet Kept Humming During 2 Hurricanes
From ACM News

How the Internet Kept Humming During 2 Hurricanes

At one node of the industrial backbone that keeps the internet running, employees sheltered from the worst of Hurricane Irma in a stairwell of a seven-story building...

Infrared Signals in Surveillance Cameras Let Malware Jump Network Air Gaps
From ACM News

Infrared Signals in Surveillance Cameras Let Malware Jump Network Air Gaps

Researchers have devised malware that can jump airgaps by using the infrared capabilities of an infected network's surveillance cameras to transmit data to and...

Chips Off the Old block: Computers Are Taking Design Cues from Human Brains
From ACM News

Chips Off the Old block: Computers Are Taking Design Cues from Human Brains

We expect a lot from our computers these days. They should talk to us, recognize everything from faces to flowers, and maybe soon do the driving.

Conservatives, Liberals ­nite Against Silicon Valley
From ACM Careers

Conservatives, Liberals ­nite Against Silicon Valley

The days of unqualified praise from Washington are over for the country's biggest tech companies, whose size and power are increasingly drawing attacks from both...

Congressional Redistricting Less Contentious When Resolved ­sing Computer Algorithm
From ACM TechNews

Congressional Redistricting Less Contentious When Resolved ­sing Computer Algorithm

Researchers at the University of Illinois have proposed a computer algorithm that could ease congressional districting and make the process fairer for constituents...

Inside the Equifax Hack
From ACM TechNews

Inside the Equifax Hack

The Equifax breach, attributed to a server flaw disclosed by Cisco researchers that went unpatched, has potentially exposed an estimated 143 million Americans'...

Wanna Stop Distracted Driving? Make Cars That Watch Their Humans
From ACM News

Wanna Stop Distracted Driving? Make Cars That Watch Their Humans

Everyone knows that distracted driving is a problem, but it tends to fall in the "other people/not me" category of personal risk assessment among drivers.

Treating Cancer, Stopping Violence . . . How AI Protects US
From ACM News

Treating Cancer, Stopping Violence . . . How AI Protects US

For some, the spread of artificial intelligence and robotics poses a threat to our privacy, our jobs – even our safety, as more and more tasks are handed over to...

Fitness Trackers Could Benefit From Better Security
From ACM TechNews

Fitness Trackers Could Benefit From Better Security

A security analysis of two wearable fitness trackers revealed a technique for intercepting messages transmitted between the trackers and cloud servers.

To Improve Smartphone Privacy, Control Access to Third-Party Libraries
From ACM TechNews

To Improve Smartphone Privacy, Control Access to Third-Party Libraries

Researchers suggest controlling access to third-party libraries will help limit the undesired exposure of personal information by smartphone applications.

U.s. Moves to Ban Kaspersky Software in Federal Agencies Amid Concerns of Russian Espionage
From ACM News

U.s. Moves to Ban Kaspersky Software in Federal Agencies Amid Concerns of Russian Espionage

The U.S. government on Wednesday moved to ban the use of a Russian brand of security software by federal agencies amid concerns the company has ties to state-sponsored...

Spies in Our Pockets
From ACM News

Spies in Our Pockets

Electronic eavesdropping is becoming ever more nefarious in the age of smartphones and digital devices.

Researchers Devise Hopeful Defense Against Credential Spear-Phishing Attacks
From ACM TechNews

Researchers Devise Hopeful Defense Against Credential Spear-Phishing Attacks

Researchers at the University of California, Berkeley and collaborators have proposed a method for detecting credential spear-phishing attacks.

How Apple Is Bringing US Into the Age of Facial Recognition Whether We're Ready or Not
From ACM News

How Apple Is Bringing US Into the Age of Facial Recognition Whether We're Ready or Not

A whiff of dystopian creepiness has long wafted in the air whenever facial recognition has come up. Books, movies and television shows have portrayed the technology...

Pacemaker Recall Exposes National Need For Research and Education in Embedded Security
From ACM TechNews

Pacemaker Recall Exposes National Need For Research and Education in Embedded Security

The U.S. Food and Drug Administration's first major recall of pacemakers due to a cybersecurity risk highlights a national need for research and education on embedded...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account