acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Fact or Fiction?: Your Car Is Hackable
From ACM News

Fact or Fiction?: Your Car Is Hackable

When your home computer is hacked, the things at risk are your identity, finances and other digital assets.

Pay with Your Fingerprint
From ACM News

Pay with Your Fingerprint

Anyone with an iPhone 5 can use its fingerprint reader to unlock the device and pay for apps or music in Apple's iTunes store.

How Gmail Happened: The Inside Story of Its Launch 10 Years Ago Today
From ACM News

How Gmail Happened: The Inside Story of Its Launch 10 Years Ago Today

If you wanted to pick a single date to mark the beginning of the modern era of the web, you could do a lot worse than choosing Thursday, April 1, 2004, the day...

Open Enigma Project Makes Encryption Machines Accessible
From ACM News

Open Enigma Project Makes Encryption Machines Accessible

Enigma machines have captivated everyone from legendary code breaker Alan Turing and the dedicated cryptographers from England's Bletchley Park to historians and...

How the Nsa Would Get Phone Data ­nder Obama Administration's New Plan
From ACM News

How the Nsa Would Get Phone Data ­nder Obama Administration's New Plan

One of the key points in the "fact sheet" that the White House published today about its plan to end the NSA's bulk collection of phone record data is that while...

A 'crisis' in Online Ads: One-Third of Traffic Is Bogus
From ACM News

A 'crisis' in Online Ads: One-Third of Traffic Is Bogus

Billions of dollars are flowing into online advertising. But marketers also are confronting an uncomfortable reality: rampant fraud.

The Digital ­nwrapping of the Egyptian Priest Neswaiu
From ACM News

The Digital ­nwrapping of the Egyptian Priest Neswaiu

In the 19th century and even later, there was no shortage of people eager to watch the unwrapping of an Egyptian mummy.

N.S.A. Breached Chinese Servers Seen as Security Threat
From ACM News

N.S.A. Breached Chinese Servers Seen as Security Threat

American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deals in the United States for...

Tor ­sage in Turkey Surges During Twitter Ban
From ACM News

Tor ­sage in Turkey Surges During Twitter Ban

Since Turkish Prime Minister Recep Tayyip Erdogan implemented a ban on Twitter late last week, Tor usage in the country has surged—with connections nearly doubling...

New Models in Cosmetics Replacing Animal Testing
From Communications of the ACM

New Models in Cosmetics Replacing Animal Testing

A European law spurs scientists to develop computational simulations capable of predicting the toxicity of cosmetics.

Using Patient Data For Personalized Cancer Treatments
From Communications of the ACM

Using Patient Data For Personalized Cancer Treatments

Patient information databases eventually will help improve health outcomes and support development of new therapies.

How to Win $1 Billion on Ncaa Basketball: A Mathematician's Tips
From ACM Opinion

How to Win $1 Billion on Ncaa Basketball: A Mathematician's Tips

Last Thursday, the underground classroom at the National Museum of Mathematics in New York was filled to capacity for a college professor's PowerPoint-aided lecture...

With Oculus Rift and Project Morpheus, a Virtual Battleground May Finally Be Here
From ACM Careers

With Oculus Rift and Project Morpheus, a Virtual Battleground May Finally Be Here

Virtual reality has never quite materialized for most consumers.

Jonathan Ive Designs Tomorrow
From ACM News

Jonathan Ive Designs Tomorrow

We use Jonathan Ive's products to help us to eat, drink and sleep, to work, travel, relax, read, listen and watch, to shop, chat, date and have sex.

The Future of Brain Implants
From ACM News

The Future of Brain Implants

What would you give for a retinal chip that let you see in the dark or for a next-generation cochlear implant that let you hear any conversation in a noisy restaurant...

The Data Brokers: Selling Your Personal Information
From ACM Opinion

The Data Brokers: Selling Your Personal Information

Over the past six months or so, a huge amount of attention has been paid to government snooping, and the bulk collection and storage of vast amounts of raw data...

Stanford Students Show Phone Record Surveillance Can Yield Vast Amounts of Information
From ACM News

Stanford Students Show Phone Record Surveillance Can Yield Vast Amounts of Information

The National Security Agency's mass surveillance of telephone metadata could yield detailed information about the private lives of individuals far beyond what the...

Taking an Age-Old Approach to ­i
From ACM News

Taking an Age-Old Approach to ­i

Web and app designers need to be mindful of the changing capabilities of aging users.

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers
From ACM News

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers

The tense on-the-ground standoff in Ukraine has already tipped into open hostilities online, with hackers targeting members of parliament and state agencies.

Computer Science: The Learning Machines
From ACM News

Computer Science: The Learning Machines

Three years ago, researchers at the secretive Google X lab in Mountain View, California, extracted some 10 million still images from YouTube videos and fed them...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account