acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Automotive Lobbying Group Abandons the Term 'Self-Driving'
From ACM News

Automotive Lobbying Group Abandons the Term 'Self-Driving'

That's Tesla's mess to deal with.

Booby-Trapped Sites Delivered Potent Backdoor Trojan to macOS Users
From ACM TechNews

Booby-Trapped Sites Delivered Potent Backdoor Trojan to macOS Users

Security researchers have uncovered macOS malware that can be installed by exploits almost impossible for most users to detect.

Solving for Why
From Communications of the ACM

Solving for Why

A focus on causality is promising to help researchers overcome shortcomings that have bedeviled more traditional approaches to artificial intelligence.

Virtual Duplicates
From Communications of the ACM

Virtual Duplicates

Digital twins aim to model reality so we can see how it changes.

The Rise of A.I. Fighter Pilots
From ACM News

The Rise of A.I. Fighter Pilots

Artificial intelligence is being taught to fly warplanes. Can the technology be trusted?

UTSA Researchers Help Protect EV Charging Stations from Cyberattacks
From ACM TechNews

UTSA Researchers Help Protect EV Charging Stations from Cyberattacks

Researchers have found that electrical vehicle charging stations and their Internet-based management systems are vulnerable to cybersecurity attacks.

Microsoft Warns of Destructive Cyberattack on Ukrainian Computer Networks
From ACM News

Microsoft Warns of Destructive Cyberattack on Ukrainian Computer Networks

The malware was revealed as Russian troops remained massed at the Ukrainian border, and after Ukrainian government agencies had their websites defaced.

New Windows Server Updates Cause DC Boot Loops, Break Hyper-V
From ACM News

New Windows Server Updates Cause DC Boot Loops, Break Hyper-V

The updates cause Windows domain controllers enter a boot loop, with servers getting into an endless cycle of Windows starting and then rebooting after a few minutes...

Algorithm Helps Robots Avoid Obstacles in Their Path
From ACM TechNews

Algorithm Helps Robots Avoid Obstacles in Their Path

An algorithm developed by researchers at the University of South Australia aims to help robots avoid humans and other obstacles in their path.

Top Programming Languages: Coding Favorite Tops List Again
From ACM TechNews

Top Programming Languages: Coding Favorite Tops List Again

Python has topped software testing outfit Tiobe's programming language list for the second year in a row, as it was awarded the title of programming language of...

AI Powers Autonomous Materials Discovery
From ACM TechNews

AI Powers Autonomous Materials Discovery

Cornell University researchers have developed an artificial intelligence tool that aims to speed up the process of materials discovery.

Walk-Through Metal Detectors Can Be Hacked, Research Finds
From ACM TechNews

Walk-Through Metal Detectors Can Be Hacked, Research Finds

Researchers at Cisco Talos have identified nine software vulnerabilities in commonly used metal detectors manufactured by Garrett.

Machine Learning Framework Models Quantum Devices
From ACM TechNews

Machine Learning Framework Models Quantum Devices

An algorithm developed by researchers at the University of Tokyo uses machine learning to determine the relationship between quantum inputs and outputs in order...

Homeland Security Offers Hackers a Bounty to Find Bugs
From ACM TechNews

Homeland Security Offers Hackers a Bounty to Find Bugs

The U.S. Department of Homeland Security announced the "Hack DHS" bug bounty program in which outside hackers will be paid to identify vulnerabilities in certain...

U.S. National Security Adviser Asks Software Companies to Discuss Cybersecurity
From ACM TechNews

U.S. National Security Adviser Asks Software Companies to Discuss Cybersecurity

White House national security adviser Jake Sullivan has asked major software companies and developers to discuss ways to improve digital security, as hacks against...

Texas Teen Creates App to Give His Sister a Voice
From ACM TechNews

Texas Teen Creates App to Give His Sister a Voice

Texas-based teenager Archer Calder created a Web-based application to give his sister Della, who has a speech-inhibiting genetic disorder, the means to communicate...

Nike Buys Virtual Sneaker Maker RTFKT in Metaverse Push
From ACM TechNews

Nike Buys Virtual Sneaker Maker RTFKT in Metaverse Push

Nike has acquired RTFKT, a virtual sneaker company, as part of an effort to expand in the "metaverse," where users can purchase clothing, virtual land, and other...

Exploring Emotions with VR
From ACM TechNews

Exploring Emotions with VR

Researchers used virtual reality to evoke emotions as realistically as possible in a study.

The 'Most Serious' Security Breach Ever is Unfolding Right Now. Here's What You Need to Know
From ACM News

The 'Most Serious' Security Breach Ever is Unfolding Right Now. Here's What You Need to Know

Much of the Internet, from Amazon's cloud to connected TVs, is riddled with the log4j vulnerability, and has been for years.

Converting Laws to Programs
From Communications of the ACM

Converting Laws to Programs

In highly regulated industries, it is critical that laws are translated precisely into code that reflects their intent.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account