acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Spy in Your Pocket
From ACM News

Spy in Your Pocket

Smartphones can analyze virtually every aspect of your personality, beliefs, and behaviors.

Treating Asthma with Data Analytics
From ACM TechNews

Treating Asthma with Data Analytics

A new health information system was designed to help asthma patients better manage their condition.

Millions of Tweets Peddled Conspiracy Theories About Coronavirus in Other Countries, an Unpublished U.S. Report Says
From ACM TechNews

Millions of Tweets Peddled Conspiracy Theories About Coronavirus in Other Countries, an Unpublished U.S. Report Says

An unpublished U.S. State Department study estimated that about 2 million tweets promoted conspiracy theories about the coronavirus over the three-week period when...

Optical System Could Lead to Devices That Can Recognize Objects Instantly
From ACM TechNews

Optical System Could Lead to Devices That Can Recognize Objects Instantly

An optical neural network concurrently works with multiple wavelengths of light.

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys
From ACM TechNews

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys

Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...

Researchers Identify Cybersecurity Approach to Protect Army Systems
From ACM TechNews

Researchers Identify Cybersecurity Approach to Protect Army Systems

Researchers have developed an approach to protect Army systems from attack in ways that don't require massive amounts of manual intervention.

How the Cloud Has Opened Doors for Hackers
From ACM TechNews

How the Cloud Has Opened Doors for Hackers

Corporate transfers of operations to the cloud have elevated the threat of hacking.

This App Lets You See IoT Devices Around You and What Data They're Taking
From ACM TechNews

This App Lets You See IoT Devices Around You and What Data They're Taking

Researchers have developed an app that will let users know what IoT technologies are operating in the immediate vicinity and what data they are collecting. 

Flaw in Billions of Wi-Fi Devices Left Communications Open to Eavesdropping
From ACM TechNews

Flaw in Billions of Wi-Fi Devices Left Communications Open to Eavesdropping

Researchers at Slovakian Internet security company ESET discovered that billions of devices are affected by a Wi-Fi vulnerability that allows nearby attackers to...

Oregon Engineer Makes History With New Traffic Light Timing Formula
From ACM News

Oregon Engineer Makes History With New Traffic Light Timing Formula

Mats Jarlstrom was fined $500 for criticizing the timing of traffic lights. He sued, won, and now his formula will help traffic engineers around the world.

'Surfing Attack' Hacks Siri, Google with Ultrasonic Waves
From ACM TechNews

'Surfing Attack' Hacks Siri, Google with Ultrasonic Waves

A multi-institutional collaboration has demonstrated a "surfing attack" that uses ultrasonic waves to hijack voice-recognition systems on cellphones, including...

Study Allows Brain, Artificial Neurons to Link Up Over the Web
From ACM TechNews

Study Allows Brain, Artificial Neurons to Link Up Over the Web

Researchers have developed a system that brain neurons and artificial neurons to communicate with each other over the Internet.

Sandboxing Approach Increases Browser Security
From ACM TechNews

Sandboxing Approach Increases Browser Security

A new Web browser security scheme accelerates Web apps that run within a browser, while keeping those apps within "secure sandboxes" to prevent hijacking by malware...

Hacking Bluetooth
From ACM News

Hacking Bluetooth

Bluetooth device users seldom suspect they are opening themselves to man-in-the-middle hacker attacks.

Protecting Sensitive Metadata So It Can't be Used for Surveillance
From ACM TechNews

Protecting Sensitive Metadata So It Can't be Used for Surveillance

MIT researchers have developed a scalable metadata-protection scheme to shield the information of millions of users.

Across the Language Barrier
From Communications of the ACM

Across the Language Barrier

Translation devices are getting better at making speech and text understandable in different languages.

Can Nanosheet Transistors Keep Moore's Law Alive?
From Communications of the ACM

Can Nanosheet Transistors Keep Moore's Law Alive?

The technology promises to advance semiconductors and computing, but also introduces new questions and challenges.

Study Finds Quarter of Climate Change Tweets From Bots
From ACM TechNews

Study Finds Quarter of Climate Change Tweets From Bots

Brown University researchers found 25% of 6.5-million Twitter posts about climate change were likely produced by bots, giving the impression of widespread climate...

Chip Brings Ultra-Low-Power Wi-Fi to IoT Devices
From ACM TechNews

Chip Brings Ultra-Low-Power Wi-Fi to IoT Devices

A new ultra-low-power Wi-Fi radio enables Internet of Things devices to communicate with existing Wi-Fi networks using 5,000 times less power.

Mapping Coronavirus: South Koreans Turn to Online Tracking as Cases Surge
From ACM TechNews

Mapping Coronavirus: South Koreans Turn to Online Tracking as Cases Surge

Private software developers have launched websites and apps to help people in South Korea track cases of coronavirus and avoid places where infected people have...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account