acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Risky Business
From Communications of the ACM

Risky Business

Governments, companies, and individuals have suffered an unusual number of highly publicized data breaches this year. Is there a solution?

Hacking Cars
From Communications of the ACM

Hacking Cars

Researchers have discovered important security flaws in modern automobile systems. Will car thieves learn to pick locks with their laptops?

Modeling Chaotic Storms
From Communications of the ACM

Modeling Chaotic Storms

Scientists say improvements to extreme-weather prediction are possible with new weather models and a reinvention of the modeling technologies used to process them...

Precision-Controlled Microbots Show They Could Take On Industrial-Scale Jobs
From ACM News

Precision-Controlled Microbots Show They Could Take On Industrial-Scale Jobs

A pioneering research institute that introduced the computer world to the mouse, hypertext, and networks is now setting its sights a bit lower.

Hyperlinking Doesn't Constitute Defamation, Supreme Court of Canada Rules
From ACM News

Hyperlinking Doesn't Constitute Defamation, Supreme Court of Canada Rules

The Supreme Court of Canada has erected a shield to protect those who post Internet links to defamatory sites.

From ACM News

Faq on Son of Stuxnet

What is Duqu? Duqu (pronounced dyu kyu) is primarily a remote-access Trojan targeted at a limited number of organizations in Europe, Africa, and the Middle East...

How Google's Self-Driving Car Works
From ACM News

How Google's Self-Driving Car Works

Once a secret project, Google's autonomous vehicles are now out in the open, quite literally, with the company test-driving them on public roads and, on one occasion...

Georgia Tech Turns Iphone Into Spiphone
From ACM News

Georgia Tech Turns Iphone Into Spiphone

It's a pattern that no doubt repeats itself daily in hundreds of millions of offices around the world: People sit down, turn on their computers, set their mobile...

PingPong-Playing Robots Debut
From ACM News

PingPong-Playing Robots Debut

Robots are already taking away jobs at factories. Now, it appears, they're ready to rule the table tennis court, too. Two pingpong-playing humanoid robots named...

DARPA Wants to Master the Science of Propaganda
From ACM News

DARPA Wants to Master the Science of Propaganda

Mark Twain once tried to distinguish between the storyteller’s art and tales that a machine could generate. He observed that stringing "incongruities and absurdities...

From ACM News

Control a Wheelchair By Biting and Blinking

Imagine: You're paralyzed from the neck down, a full-on quadriplegic with what doctors refer to as a "high level spinal cord injury." How do you get around?

From ACM News

Robot Wars 'Still a Long Way Off'

"I'll be back" said Arnold Schwarzenegger as cyborg-assassin the Terminator, back from the year 2029 to carry out a murder in 1984. But it seems that, when it...

From ACM News

Making Cars More Hacker-Proof

Computer security companies and researchers have dedicated a lot of time and money to testing the virtual padlocks on your online accounts. Some are now focusing...

From ACM News

New Malicious Program by Creators of Stuxnet Is Suspected

The designers of Stuxnet, the computer worm that was used to vandalize an Iranian nuclear site, may have struck again, security researchers say.

From ACM News

Transcending Borders but Not Laws

As cloud computing spreads data around the globe, a haze of legal and privacy questions follows.

Preventing a Pearl Harbor of Cyberspace
From ACM News

Preventing a Pearl Harbor of Cyberspace

At a time when the Internet has been inextricably linked to our national infrastructure, there are understandably serious concerns about the ability of the U.S...

From ACM News

The Quest For the Holy Grail of Storage

The cloud has a big problem on its hands: Cloud storage is failure-prone, slow, and infinitely quirky.

Georgia Tech Releases Cyber Threats Forecast For 2012
From ACM TechNews

Georgia Tech Releases Cyber Threats Forecast For 2012

A new report warns that 2012 will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control...

Robot Car to Cut Jams & Crashes
From ACM TechNews

Robot Car to Cut Jams & Crashes

Oxford University researchers have installed robotic technology in a Wildcat vehicle built by BAE Systems that transforms the vehicle into an autonomous car. The...

From ACM News

­.s. Debated Cyberwarfare in Attack Plan on Libya

Just before the American-led strikes against Libya in March, the Obama administration intensely debated whether to open the mission with a new kind of warfare...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account