acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Smartphone Hacks 3D Printer By Measuring 'leaked' Energy and Acoustic Waves
From ACM TechNews

Smartphone Hacks 3D Printer By Measuring 'leaked' Energy and Acoustic Waves

State University of New York at Buffalo researchers say anyone with a smartphone could potentially steal intellectual property from a business' three-dimensional...

Microsoft's Top Lawyer Becomes a Civil Rights Crusader
From ACM Opinion

Microsoft's Top Lawyer Becomes a Civil Rights Crusader

When Apple CEO Tim Cook refused to help the FBI get into a mass murderer's iPhone last winter, he was hailed for his boldness in fighting the government on ...

Your Car's New Software Is Ready. Update Now?
From ACM News

Your Car's New Software Is Ready. Update Now?

Tired of your vehicle and its aging, limited features? Don’t trade it in just yet. Download new software instead.

CMU Algorithm Detects Online Fraudsters
From ACM TechNews

CMU Algorithm Detects Online Fraudsters

Carnegie Mellon University researchers say they have developed an algorithm that can perceive fraudsters hiding behind a digital veneer of legitimacy.

Google's Clever Plan to Stop Aspiring Isis Recruits
From ACM News

Google's Clever Plan to Stop Aspiring Isis Recruits

Google has built a half-trillion-dollar business out of divining what people want based on a few words they type into a search field.

We're Ahead of Schedule to Turn 'star Trek' Tech Into Reality
From ACM News

We're Ahead of Schedule to Turn 'star Trek' Tech Into Reality

Most Star Trek stories from the vaunted franchise turning 50 this week take place in a distant future we're not likely to see.

Research Examines Global Security and Surveillance Technologies
From ACM TechNews

Research Examines Global Security and Surveillance Technologies

Government efforts to fight crime using surveillance and information technologies often yield poor results, says University of Colorado Denver professor Keith Guzik...

Does the Messaging Service Telegram Take Privacy Too Far?
From ACM News

Does the Messaging Service Telegram Take Privacy Too Far?

The encryption of digital information is considered the best protection against hackers, snoops or potential enemies looking to poke around into private exchanges...

Keystroke Recognition ­ses Wi-Fi Signals to Snoop
From ACM TechNews

Keystroke Recognition ­ses Wi-Fi Signals to Snoop

Researchers have learned how to use off-the-shelf computer gear and a standard Wi-Fi connection to read keystrokes from a person in close proximity.

How Spy Tech Firms Let Governments See Everything on a Smartphone
From ACM News

How Spy Tech Firms Let Governments See Everything on a Smartphone

Want to invisibly spy on 10 iPhone owners without their knowledge? Gather their every keystroke, sound, message and location?

Building a New Tor that Can Resist Next-Generation State Surveillance
From ACM News

Building a New Tor that Can Resist Next-Generation State Surveillance

Since Edward Snowden stepped into the limelight from a hotel room in Hong Kong three years ago, use of the Tor anonymity network has grown massively.

So Much for Counter-Phishing Training: Half of People Click Anything Sent to Them
From ACM News

So Much for Counter-Phishing Training: Half of People Click Anything Sent to Them

Security experts often talk about the importance of educating people about the risks of "phishing" e-mails containing links to malicious websites. But sometimes...

Forget Software: Now Hackers Are Exploiting Physics
From ACM News

Forget Software: Now Hackers Are Exploiting Physics

Practically every word we use to describe a computer is a metaphor.

Here's How Russian Hackers Could Actually Tip an American Election
From ACM Opinion

Here's How Russian Hackers Could Actually Tip an American Election

Reports this week of Russian intrusions into U.S. election systems have startled many voters, but computer experts are not surprised.

Comey: Fbi Wants 'adult Conversation' on Device Encryption
From ACM News

Comey: Fbi Wants 'adult Conversation' on Device Encryption

FBI Director James Comey warned again Tuesday about the bureau's inability to access digital devices because of encryption and said investigators were collecting...

System Might Detect Doctored Images and Videos For the Military
From ACM TechNews

System Might Detect Doctored Images and Videos For the Military

An international coalition of researchers is developing technologies that could help the U.S. military detect manipulations of open source images.

G.e., the 124-Year-Old Software Start-­p
From ACM Careers

G.e., the 124-Year-Old Software Start-­p

It may not qualify as a lightning-bolt eureka moment, but Jeffrey R. Immelt, chief executive of General Electric, recalls the June day in 2009 that got him thinking...

Secure Networks For the Internet of the Future
From ACM TechNews

Secure Networks For the Internet of the Future

Researchers at Bavaria, Germany's University of Wurzburg are developing secure and efficient networks for the Internet of the future.

Apple Issues Global Ios ­pdate After Attempt to ­se Spyware on Activist's Iphone
From ACM News

Apple Issues Global Ios ­pdate After Attempt to ­se Spyware on Activist's Iphone

A botched attempt to break into the iPhone of an Arab activist using hitherto unknown espionage software has triggered a global upgrade of Apple's mobile operating...

Chaos Could Provide the Key to Enhanced Wireless Communications
From ACM TechNews

Chaos Could Provide the Key to Enhanced Wireless Communications

Researchers have shown that adding chaos to wireless communication can augment its reliability, efficiency, and security.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account