acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Best 'low-Tech' Spycraft Tricks
From ACM News

The Best 'low-Tech' Spycraft Tricks

In the wake of Edward Snowden's revelations about the US National Security Agency’s activities around the globe, authorities in Russia and Germany declared they...

The Most Wanted Man in the World
From ACM News

The Most Wanted Man in the World

The message arrives on my "clean machine," a MacBook Air loaded only with a sophisticated encryption package.

Do Quantum Computers Threaten Global Encryption Systems?
From ACM News

Do Quantum Computers Threaten Global Encryption Systems?

Make a mobile phone call and encryption is there to stop eavesdroppers listening in.

'ambiguous' Warfare Buys Upgrade Time For Russia's Military
From ACM News

'ambiguous' Warfare Buys Upgrade Time For Russia's Military

Unmarked Russian soldiers who seized Ukraine's Crimea region earlier this year gave every appearance of military professionals well equipped with modern body armor...

As Data Overflows Online, Researchers Grapple With Ethics
From ACM TechNews

As Data Overflows Online, Researchers Grapple With Ethics

Researchers say there needs to be ethical guidelines in place for social science studies that use personal data collected by various social media websites.

As Data Overflows Online, Researchers Grapple With Ethics
From ACM News

As Data Overflows Online, Researchers Grapple With Ethics

Scholars are exhilarated by the prospect of tapping into the vast troves of personal data collected by Facebook, Google, Amazon, and a host of start-ups, which...

Okcupid's Co-Founder on Experiments, Data Science and the Myth of the 'unicorn'
From ACM Opinion

Okcupid's Co-Founder on Experiments, Data Science and the Myth of the 'unicorn'

Christian Rudder, co-founder and president of the IAC/InterActiveCorp.'s OkCupid, caused a stir recently when he responded to Facebook's news feed controversy with...

Simplifying the Bull: How Picasso Helps to Teach Apple's Style
From ACM Careers

Simplifying the Bull: How Picasso Helps to Teach Apple's Style

Apple may well be the only tech company on the planet that would dare compare itself to Picasso.

When Hackers Test For Flaws, They Might Earn Cash—or Threats
From ACM Careers

When Hackers Test For Flaws, They Might Earn Cash—or Threats

To hack or not to hack?

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone
From ACM Opinion

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone

In the computer and network security industry, few people are as well known as Dan Geer.

Here's How the Feds Are Teaming Up With Hackers to Save US All from Robocalls
From ACM Careers

Here's How the Feds Are Teaming Up With Hackers to Save US All from Robocalls

The Federal Trade Commission is at one of the world's biggest hacker conferences this weekend, where hackers are competing to help save us all from robocalls.

Traffic Light Hackers Could Cause Jams Across the US
From ACM News

Traffic Light Hackers Could Cause Jams Across the US

Branden Ghena pulls his car up under a traffic light in a city in Michigan.

Malware Traffic Spikes Preceded Russian and Israeli Conflicts
From ACM News

Malware Traffic Spikes Preceded Russian and Israeli Conflicts

A study of malware operating on corporate and government networks suggests that the communication patterns of these programs could warn of major conflicts.

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges
From ACM Careers

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges

Def Con is one of the world's biggest hacker conventions, an annual gathering of security experts, cryptographers and at least a few people who could surreptitiously...

How Wwi Codebreakers Taught Your Gas Meter to Snitch on You
From ACM Opinion

How Wwi Codebreakers Taught Your Gas Meter to Snitch on You

In the depths of night on August 5th 1914 the British Cable Ship Alert took the first significant action of World War I, severing the five German submarine cables...

'internet of Things,' Not Privacy, to Dominate at Black Hat
From ACM News

'internet of Things,' Not Privacy, to Dominate at Black Hat

As many as 13 previously unknown vulnerabilities in home Wi-Fi routers and networked storage systems are set to be disclosed at the Black Hat computer security...

Arrogance Is Good: In Defense of Silicon Valley
From ACM Careers

Arrogance Is Good: In Defense of Silicon Valley

Sam Altman sits behind his desk with his knees pulled up to his chest, eating dried apricots.

Watch This Wireless Hack Pop a Car's Locks in Minutes
From ACM News

Watch This Wireless Hack Pop a Car's Locks in Minutes

Shims and coat hangers are the clumsy tools of last century's car burglars.

Hacker Says to Show Passenger Jets at Risk of Cyber Attack
From ACM News

Hacker Says to Show Passenger Jets at Risk of Cyber Attack

Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight...

Can Google Build a Typeface to Support Every Written Language?
From ACM News

Can Google Build a Typeface to Support Every Written Language?

Google has taken on its fair share of ambitious projects—digitizing millions and millions of books, mapping the whole world, pioneering self-driving cars.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account