acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


America Is 'Dropping Cyberbombs'—But How Do They Work?
From ACM News

America Is 'Dropping Cyberbombs'—But How Do They Work?

Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was "dropping cyberbombs," taking its ongoing...

We Know Where You Live
From ACM TechNews

We Know Where You Live

Researchers have demonstrated that snoopers armed with little sophisticated technology can expose the home and workplace addresses of Twitter users. 

Robots Learn How to Make Friends and Influence People
From ACM TechNews

Robots Learn How to Make Friends and Influence People

Stanford University researchers have developed a computer-vision algorithm that predicts the movement of people in a busy space. 

Study of ­2 Could Help Music Fans Find What They're Looking For
From ACM TechNews

Study of ­2 Could Help Music Fans Find What They're Looking For

Online music providers could use music fans' emotions to inform searches, recommendations, and playlists.

More Than 30 States Offer Online Voting, but Experts Warn It Isn't Secure
From ACM TechNews

More Than 30 States Offer Online Voting, but Experts Warn It Isn't Secure

More than 30 states will be hosting online voting systems by the time of the U.S. presidential election in November, but experts warn such systems are still insecure...

A Mathematical Proof Takes 200 Terabytes To State
From ACM News

A Mathematical Proof Takes 200 Terabytes To State

The latest example of proof by computer enters a new realm: a proof 200 terabytes in size.

Nsa Can Legally Access Metadata of 25,000 Callers Based on a Single Suspect's Phone
From ACM News

Nsa Can Legally Access Metadata of 25,000 Callers Based on a Single Suspect's Phone

Despite changes to the law, the U.S. National Security Agency can still request metadata from tens of thousands of private phones if they are indirectly connected...

Scientists Hold Secret Meeting to Consider Creating a Synthetic Human Genome
From ACM News

Scientists Hold Secret Meeting to Consider Creating a Synthetic Human Genome

Scientists are now contemplating the creation of a synthetic human genome, meaning they would use chemicals to manufacture all the DNA contained in human chromosomes...

Second Cycle of Martian Seasons Completing For Curiosity Rover
From ACM News

Second Cycle of Martian Seasons Completing For Curiosity Rover

NASA's Curiosity Mars rover completed its second Martian year since landing inside Gale Crater nearly four Earth years ago, which means it has recorded environmental...

How to Make Passwords That Cannot Be Compromised By Torture or Coercion
From ACM TechNews

How to Make Passwords That Cannot Be Compromised By Torture or Coercion

Researchers have hypothesized a method to measure an individual's stress levels and determine whether they are being coerced into revealing a password. 

7 Cities Head For Smart City Transportation Challenge Finals
From ACM News

7 Cities Head For Smart City Transportation Challenge Finals

The cities continue to compete for as much as $50 million to improve safety, enhance mobility, boost economies, and address climate change.

Genome Reveals Why Giraffes Have Long Necks
From ACM News

Genome Reveals Why Giraffes Have Long Necks

Call it a tall task: researchers have decoded the genomes of the giraffe and its closest relative, the okapi.

When Websites Won't Take No for an Answer
From ACM News

When Websites Won't Take No for an Answer

Harry Brignull, a user-experience consultant in Britain who helps websites and apps develop consumer-friendly features, has a professional bone to pick with sites...

A Few Controversial Numbers May Be Illegal to Share
From ACM News

A Few Controversial Numbers May Be Illegal to Share

Jon Johansen's program worked. The Norwegian teenager watched as it downloaded 200 megabytes of a recently released movie, The Matrix, from a DVD onto his computer...

Cybersecurity Sleuths Learn to Think Like Hackers
From ACM Careers

Cybersecurity Sleuths Learn to Think Like Hackers

About 35 high-school students sit at neatly arranged rows of tables in the university's gym. Another 115 college-level contestants surround the high schoolers.

4 Big Plans to Fix Internet Security
From ACM TechNews

4 Big Plans to Fix Internet Security

Inadequate security is endemic to the Internet, and solving this problem will require effective trust and security mechanisms. 

System Harnesses Thousands of Network Cameras For Public Safety
From ACM TechNews

System Harnesses Thousands of Network Cameras For Public Safety

Purdue University researchers have developed a prototype system that can tap into thousands of cameras located in numerous venues. 

How Toy Street Lamps Are Shedding New Light on Quantum Computing
From ACM TechNews

How Toy Street Lamps Are Shedding New Light on Quantum Computing

The bulbs from toy street lamps, among other things, are helping to reveal new insights into quantum computing. 

Your Smartphone and Tablet May Be Making You Adhd-Like
From ACM TechNews

Your Smartphone and Tablet May Be Making You Adhd-Like

Smartphones and other digital technology may be inducing attention-deficit/hyperactivity disorder-like symptoms, according to a new study.

How to Hack the Hackers: The Human Side of Cyber Crime
From ACM News

How to Hack the Hackers: The Human Side of Cyber Crime

Say what you will about cybercriminals, says Angela Sasse, "their victims rave about the customer service".
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account