acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


John H. Holland 1929-2015
From Communications of the ACM

John H. Holland 1929-2015

John Henry Holland, a pioneer in the study of complex adaptive systems and of what became known as genetic algorithms, died in August at the age of 86.

You've Been Misled About What Makes a Good Password
From ACM TechNews

You've Been Misled About What Makes a Good Password

Symantec researchers recently found requiring numbers and uppercase characters in passwords does not do much to make them stronger. 

Why Self-Driving Cars Must Be Programmed to Kill
From ACM News

Why Self-Driving Cars Must Be Programmed to Kill

When it comes to automotive technology, self-driving cars are all the rage.

You Wouldn't Think It, But Typeface Piracy Is a Big Problem
From ACM News

You Wouldn't Think It, But Typeface Piracy Is a Big Problem

It's safe to assume that most people have no idea that fonts, like music or movies, are protected by intellectual property laws, they usually come with a hefty...

X-Ray Scans Expose an Ingenious Chip-and-Pin Card Hack
From ACM News

X-Ray Scans Expose an Ingenious Chip-and-Pin Card Hack

The chip-enabled credit card system long used in Europe, a watered down version of which is rolling out for the first time in America, is meant to create a double...

After 10 Years, Google Books Is Legal
From ACM News

After 10 Years, Google Books Is Legal

On Friday, a federal circuit court made clear that Google Books is legal.

Can Myriad Wireless Networks Connect as One Fast, Secure System?
From ACM TechNews

Can Myriad Wireless Networks Connect as One Fast, Secure System?

U.S. Defense Advanced Research Projects Agency researchers are working on a program that aims to solve critical wireless technology problems. 

New Research Method Identifies Stealth Attacks on Complicated Computer Systems
From ACM TechNews

New Research Method Identifies Stealth Attacks on Complicated Computer Systems

Virginia Polytechnic Institute and State University researchers have developed a program anomaly-detection approach to discovering stealth attacks on computers. ...

­niversities, ­tility Research Protecting Nation's Power Grid From Cyberattacks
From ACM TechNews

­niversities, ­tility Research Protecting Nation's Power Grid From Cyberattacks

The U.S. Department of Energy Center for Securing Electric Energy Delivery Systems  aims to help safeguard U.S. power utilities from cyberattacks. 

Most Americans Would Be Fine with Some Internet Surveillance If They Were Notified
From ACM News

Most Americans Would Be Fine with Some Internet Surveillance If They Were Notified

Despite increasingly heated rhetoric from opponents of government surveillance, a recent survey shows that most Americans would be okay with many kinds of Internet...

Apple Ceo Defends Encryption, Opposes Government Back Door
From ACM News

Apple Ceo Defends Encryption, Opposes Government Back Door

Apple Inc.'s Chief Executive Officer and the director of the National Security Agency squared off on Monday in a debate over how much access technology companies...

Seeing Stars, Again: Naval Academy Reinstates Celestial Navigation
From ACM Careers

Seeing Stars, Again: Naval Academy Reinstates Celestial Navigation

The same techniques guided ancient Polynesians in the open Pacific and led Sir Ernest Shackleton to remote Antarctica, then oriented astronauts when the Apollo...

Researchers Find 85 Percent of Android Devices Insecure
From ACM TechNews

Researchers Find 85 Percent of Android Devices Insecure

Researchers have developed a scorecard for Android devices based on how often manufacturers and network operators patch their devices. 

How Human Nature Could Foil Tesla's New Autopilot
From ACM TechNews

How Human Nature Could Foil Tesla's New Autopilot

Researchers and driving safety experts warn the new autopilot option installed in most Tesla vehicles could cause unsafe conditions. 

How the Nsa Can Break Trillions of Encrypted Web and Vpn Connections
From ACM News

How the Nsa Can Break Trillions of Encrypted Web and Vpn Connections

For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic...

Closing Cybersecurity's Race Gap
From ACM TechNews

Closing Cybersecurity's Race Gap

During an event on Capitol Hill, experts discussed the U.S. government cybersecurity labor shortage and the underrepresentation of women and minorities in the field...

Vint Cerf and 260 Experts Give FCC a Plan to Secure Wi-Fi Routers
From ACM TechNews

Vint Cerf and 260 Experts Give FCC a Plan to Secure Wi-Fi Routers

Network and cybersecurity experts are critiquing U.S. Federal Communications Commission proposed rules for Wi-Fi routers and RF devices.

Hackers Can Silently Control Siri From 16 Feet Away
From ACM News

Hackers Can Silently Control Siri From 16 Feet Away

Siri may be your personal assistant. But your voice is not the only one she listens to.

Despite Exposure, New Nations Joining Cyberespionage Game
From ACM News

Despite Exposure, New Nations Joining Cyberespionage Game

Researchers say some smaller, poorer nations are now using spy software, suggesting that recent data leaks and lawsuits have not deterred governments from investing...

The Brave New World of Computer Security
From ACM TechNews

The Brave New World of Computer Security

Northeastern University professor Cristina Nita-Rotaru has been researching how to keep information both accessible and safe for 17 years. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account