acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


U.s. Establishes Sanctions Program to Combat Cyberattacks, Cyberspying
From ACM News

U.s. Establishes Sanctions Program to Combat Cyberattacks, Cyberspying

President Obama on Wednesday signed an executive order establishing the first sanctions program to allow the administration to impose penalties on individuals overseas...

After Snowden, the Nsa Faces Recruitment Challenge
From ACM Careers

After Snowden, the Nsa Faces Recruitment Challenge

Daniel Swann is exactly the type of person the National Security Agency would love to have working for it.

­.s. Supreme Court: Gps Trackers Are a Form of Search and Seizure
From ACM News

­.s. Supreme Court: Gps Trackers Are a Form of Search and Seizure

If the government puts a GPS tracker on you, your car, or any of your personal effects, it counts as a search—and is therefore protected by the Fourth Amendment...

The Healing Power of Your Own Medical Records
From ACM News

The Healing Power of Your Own Medical Records

Steven Keating's doctors and medical experts view him as a citizen of the future.

Germanwings Flight 9525, Technology, and the Question of Trust
From ACM Opinion

Germanwings Flight 9525, Technology, and the Question of Trust

Shortly before the dreadful crash of Germanwings Flight 9525, I happened to be reading part of "The Second Machine Age," a book by two academics at M.I.T., Erik...

2,636 Icelandic Genomes Pinpoint Risk For Alzheimer's, Other Diseases
From ACM News

2,636 Icelandic Genomes Pinpoint Risk For Alzheimer's, Other Diseases

An Icelandic genetics firm has sequenced the genomes of 2,636 of its countrymen and women, finding genetic markers for a variety of diseases, as well as a new timeline...

The 5 Biases Pushing Women Out of STEM
From ACM TechNews

The 5 Biases Pushing Women Out of STEM

Gender bias appears to be a key contributor to the scarcity of U.S. women in science, technology, engineering, and math, according to new studies. 

Hoax-Detecting Software Spots Fake Papers
From ACM TechNews

Hoax-Detecting Software Spots Fake Papers

Software programs that generate nonsense computer science papers have become sources of embarrassment for major academic publishers.

Why Kevin Mitnick, the World's Most Notorious Hacker, Is Still Breaking Into Computers
From ACM Careers

Why Kevin Mitnick, the World's Most Notorious Hacker, Is Still Breaking Into Computers

Look no further than Kevin Mitnick's business card to see how some things never change.

Extreme Cryptography Paves Way to Personalized Medicine
From ACM News

Extreme Cryptography Paves Way to Personalized Medicine

The dream for tomorrow's medicine is to understand the links between DNA and disease—and to tailor therapies accordingly.

Smarter Smart Grids
From ACM TechNews

Smarter Smart Grids

North Carolina State University researchers are using cloud computing resources to analyze smart grid data.

How Crashing Drones Are Exposing Secrets About ­.s. War Operations
From ACM News

How Crashing Drones Are Exposing Secrets About ­.s. War Operations

Crashing drones are spilling secrets about U.S. military operations.

Voice Control Will Force an Overhaul of the Whole Internet
From ACM News

Voice Control Will Force an Overhaul of the Whole Internet

Jason Mars built his own Siri and then he gave it away.

What If Web Search Results Were Based on Accuracy?
From ACM Opinion

What If Web Search Results Were Based on Accuracy?

Imagine, for a moment, that every Web search gave only accurate, verified information.

Deanonymizing Tor ­sers With Raptor Attacks
From ACM TechNews

Deanonymizing Tor ­sers With Raptor Attacks

Researchers have demonstrated the effectiveness of a suite of traffic analysis attacks that deanonymize Tor users. 

Stealing Data from Computers ­sing Heat
From ACM News

Stealing Data from Computers ­sing Heat

Air-gapped systems, which are isolated from the Internet and are not connected to other systems that are connected to the Internet, are used in situations that...

What's the Price Now?
From Communications of the ACM

What's the Price Now?

Dynamic pricing finds its way into a growing number of industries.

Secure-System Designers Strive to STEM Data Leaks
From Communications of the ACM

Secure-System Designers Strive to STEM Data Leaks

Attackers using side-channel analysis require little knowledge of how an implementation operates.

'space Lawyers' Help Startups Navigate the Final Legal Frontier
From ACM Careers

'space Lawyers' Help Startups Navigate the Final Legal Frontier

When Sagi Kfir meets people and tells them he is a "space attorney," they usually think he has a strange way of saying he is in real estate.

How the Dark Web Spurs a Spying 'arms Race'
From ACM News

How the Dark Web Spurs a Spying 'arms Race'

It's a technological arms race, pure and simple.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account