acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Tim Cook: Running Apple 'is Sort of a Lonely Job'
From ACM Opinion

Tim Cook: Running Apple 'is Sort of a Lonely Job'

On a sleek white coffee table in Apple CEO Tim Cook's fourth-floor office in late July, beneath framed posters of Robert F. Kennedy, the Rev. Martin Luther King...

Envisioning Bitcoin's Technology at the Heart of Global Finance
From ACM Careers

Envisioning Bitcoin's Technology at the Heart of Global Finance

A new report from the World Economic Forum predicts that the underlying technology introduced by the virtual currency Bitcoin will come to occupy a central place...

New Air-Gap Jumper Covertly Transmits Data in Hard-Drive Sounds
From ACM News

New Air-Gap Jumper Covertly Transmits Data in Hard-Drive Sounds

Researchers have devised a new way to siphon data out of an infected computer even when it has been physically disconnected from the Internet to prevent the leakage...

Researchers Find That Android Apps Can Secretly Track Users' Whereabouts
From ACM TechNews

Researchers Find That Android Apps Can Secretly Track Users' Whereabouts

A team of researchers has demonstrated how Android applications can be manipulated to transmit sensitive information using a phone's built-in sensors.

Cyberattack Concerns Real About U.s. Presidential Election, Stanford Scholar Says
From ACM TechNews

Cyberattack Concerns Real About U.s. Presidential Election, Stanford Scholar Says

Stanford University cybersecurity scholar Herbert Lin contends foreign hackers constitute a viable threat against the U.S. presidential election.

This Timing Technology Determines Who Wins the Gold
From ACM News

This Timing Technology Determines Who Wins the Gold

Timing is everything.

A New Wireless Hack Can Unlock 100 Million Volkswagens
From ACM News

A New Wireless Hack Can Unlock 100 Million Volkswagens

In 2013, when University of Birmingham computer scientist Flavio Garcia and a team of researchers were preparing to reveal a vulnerability that allowed them todelayed...

'faceless Recognition System' Can Identify You Even When You Hide Your Face
From ACM News

'faceless Recognition System' Can Identify You Even When You Hide Your Face

With widespread adoption among law enforcement, advertisers, and even churches, face recognition has undoubtedly become one of the biggest threats to privacy out...

Where in the World Is My Data and How Secure Is It?
From ACM News

Where in the World Is My Data and How Secure Is It?

When Max Schrems, an Austrian privacy activist, requested to see his personal data that Facebook stored on its servers, he was mailed a CD-ROM containing a 1,222...

Study Highlights Serious Security Threat to Many Internet ­sers
From ACM TechNews

Study Highlights Serious Security Threat to Many Internet ­sers

Researchers have identified a vulnerability in the Transmission Control Protocol of all Linux operating systems that enables attackers to hijack Internet communications...

Fbi Chief Comey: 'we Have Never Had Absolute Privacy'
From ACM News

Fbi Chief Comey: 'we Have Never Had Absolute Privacy'

FBI Director James Comey has some phones—650 of them, to be exact—that he'd really, really like to take a look at.

Encryption's Quantum Leap: The Race to Stop the Hackers of Tomorrow
From ACM TechNews

Encryption's Quantum Leap: The Race to Stop the Hackers of Tomorrow

Researchers are looking into the construction of new quantum-proof cryptography ito thwart quantum-based schemes future hackers could use to crack sensitive data...

When Computers Are The Hackers
From ACM News

When Computers Are The Hackers

A Pittsburgh company's cyber reasoning system takes the $2-million grand prize in the DARPA Cyber Grand Challenge.

How to Hack an Election in 7 Minutes
From ACM News

How to Hack an Election in 7 Minutes

When Princeton professor Andrew Appel decided to hack into a voting machine, he didn't try to mimic the Russian attackers who hacked into the Democratic National...

Cyber Protections Contemplated For U.s. Election Systems
From ACM TechNews

Cyber Protections Contemplated For U.s. Election Systems

The Obama administration is considering boosting cyber protections for U.S. election systems by classifying them as critical infrastructure.

Troll Hunters: The Twitterbots That Fight Against Online Abuse
From ACM TechNews

Troll Hunters: The Twitterbots That Fight Against Online Abuse

Researchers are working to automate the detection of harassment, but one says humans do not agree on what constitutes harassment.

Def Con: Do Smart Devices Mean Dumb Security?
From ACM News

Def Con: Do Smart Devices Mean Dumb Security?

More and more people are finding that the devices forming this network of smart stuff can make their lives easier.

Machine-Learning Algorithm Combs the Darknet For Zero Day Exploits, and Finds Them
From ACM News

Machine-Learning Algorithm Combs the Darknet For Zero Day Exploits, and Finds Them

In February 2015, Microsoft identified a critical vulnerability in its Windows operating system that potentially allowed a malicious attacker to remotely control...

Good News—the Robocalling Scourge May Not Be Unstoppable After All
From ACM News

Good News—the Robocalling Scourge May Not Be Unstoppable After All

New data shows that the majority of robot-enabled scam phone calls came from fewer than 40 call centers, a finding that offers hope the growing menace of robocalls...

Legal Confusion Threatens to Slow Data Science
From ACM News

Legal Confusion Threatens to Slow Data Science

Knowledge from millions of biological studies encoded into one network—that is Daniel Himmelstein's alluring description of Hetionet, a free online resource that...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account