acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Buying Influence: How China Manipulates Facebook and Twitter
From ACM News

Buying Influence: How China Manipulates Facebook and Twitter

Inside a Chinese propaganda campaign.

Honeypot Experiment Reveals What Hackers Want From IoT Devices
From ACM TechNews

Honeypot Experiment Reveals What Hackers Want From IoT Devices

A honeypot experiment has clarified hackers' goals in targeting Internet of Things devices.

Singapore Engineers Build Robotic Fingers with Delicate Grip
From ACM TechNews

Singapore Engineers Build Robotic Fingers with Delicate Grip

National University of Singapore engineers have constructed a robotic hand that can grasp various objects using three-dimensionally-printed fingers.

Are Apple AirTags Being Used to Track People, Steal Cars?
From ACM TechNews

Are Apple AirTags Being Used to Track People, Steal Cars?

Concerns are mounting as Apple's location-tracking AirTag devices are being found on people's cars and in their belongings, giving rise to fears of stalking.

Navigational Apps for the Blind Could Have a Broader Appeal
From ACM News

Navigational Apps for the Blind Could Have a Broader Appeal

A proliferation of new apps designed to help blind and low vision people could prove useful for everyone.

Banks Tiptoe Toward Their Cloud-Based Future
From ACM News

Banks Tiptoe Toward Their Cloud-Based Future

Cloud computing is slowly changing how Wall Street banks handle their business, but concerns with security remain.

MTG Hit with Facebook Suspension After Twitter Ban
From ACM News

MTG Hit with Facebook Suspension After Twitter Ban

"Facebook has joined Twitter in censoring me," Greene (R-GA) wrote on Gettr, a social media platform favored by some right-wing conservatives.

Large-Scale Phishing Study Shows Who Bites the Bait More Often
From ACM TechNews

Large-Scale Phishing Study Shows Who Bites the Bait More Often

Researchers at Switzerland's ETH Zurich found that study participants aged 18-19 and those aged 50-59 are most likely to click on phishing links.

Walk-Through Metal Detectors Can Be Hacked, Research Finds
From ACM TechNews

Walk-Through Metal Detectors Can Be Hacked, Research Finds

Researchers at Cisco Talos have identified nine software vulnerabilities in commonly used metal detectors manufactured by Garrett.

IT Security: Computer Attacks With Laser Light
From ACM TechNews

IT Security: Computer Attacks With Laser Light

Researchers at Germany's Karlsruhe Institute of Technology, the Technical University of Braunschweig, and the Technical University of Berlin demonstrated that physically...

U.S. National Security Adviser Asks Software Companies to Discuss Cybersecurity
From ACM TechNews

U.S. National Security Adviser Asks Software Companies to Discuss Cybersecurity

White House national security adviser Jake Sullivan has asked major software companies and developers to discuss ways to improve digital security, as hacks against...

Americans Widely Distrust Facebook, TikTok, Instagram with Their Data, Poll Finds
From ACM News

Americans Widely Distrust Facebook, TikTok, Instagram with Their Data, Poll Finds

Pulled between not trusting some tech companies and still wanting to use their products, people look to government regulation, according to a Washington Post-Schar...

Designed to Prepare for Cyberattacks, a Panel Wraps Up Its Work
From ACM News

Designed to Prepare for Cyberattacks, a Panel Wraps Up Its Work

Some of the Cyberspace Solarium Commission's work remains unfinished as lawmakers wrestle with how to oversee security of cloud computing providers and other issues...

Confidential Computing Conquers Hacks
From ACM News

Confidential Computing Conquers Hacks

Protecting data while it is in use, rather than at rest or in flight.

The 'Most Serious' Security Breach Ever is Unfolding Right Now. Here's What You Need to Know
From ACM News

The 'Most Serious' Security Breach Ever is Unfolding Right Now. Here's What You Need to Know

Much of the Internet, from Amazon's cloud to connected TVs, is riddled with the log4j vulnerability, and has been for years.

AWS Goes Down for Second Time in Two Weeks, Taking Netflix With It - Again
From ACM News

AWS Goes Down for Second Time in Two Weeks, Taking Netflix With It - Again

The outage totally shut down internet connectivity in two regions of the USA

Shrinking Artificial Intelligence
From Communications of the ACM

Shrinking Artificial Intelligence

Energy concerns push AI optimizations to the edge.

Converting Laws to Programs
From Communications of the ACM

Converting Laws to Programs

In highly regulated industries, it is critical that laws are translated precisely into code that reflects their intent.

Monetizing Your Personal Data
From Communications of the ACM

Monetizing Your Personal Data

What is your private data worth, to you and to the companies willing to pay you for it?

We Invited an AI to Debate its Own Ethics
From ACM News

We Invited an AI to Debate its Own Ethics

What it said was startling.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account