acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


New Statistical Model Lets Patient's Past Forecast Future Ailments
From ACM TechNews

New Statistical Model Lets Patient's Past Forecast Future Ailments

University of Washington researchers have developed an algorithm that makes predictions based on what a patient has already experienced as well as the experiences...

From ACM News

Spy Agency Fund Targets Bay Area Technology

With technology that would make James Bond envious, Silicon Valley companies are playing a behind-the-scenes role with the nation's most clandestine agencies, helping...

Flame Malware Makers Send 'suicide' Code
From ACM News

Flame Malware Makers Send 'suicide' Code

The creators of the Flame malware have sent a "suicide" command that removes it from some infected computers.

'Big Data' From Social Media, Elsewhere Online Redefines Trend-Watching
From ACM TechNews

'Big Data' From Social Media, Elsewhere Online Redefines Trend-Watching

Trend analysis and forecasting is being rethought thanks to the explosion of data generated by social media and other services, with IBM estimating that about 2...

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks
From ACM News

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks

It began as a hobby for a ­teenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet.

Berners-Lee: World Finally Realizes Web Belongs To No One
From ACM Opinion

Berners-Lee: World Finally Realizes Web Belongs To No One

Sir Tim Berners-Lee is the reason you're reading this story in a web browser, complete with hypertext like this and an internet address that looks like this: ...

Bionic Brains and Beyond
From ACM News

Bionic Brains and Beyond

The National Spelling Bee of 2023 started out like any other, but controversy enveloped the contest when Suzy Hamilton, an 8-year-old from Tulsa, emerged as the...

The Biometric Wallet
From ACM TechNews

The Biometric Wallet

Hitachi and Fujitsu have pioneered a new technique in which a person's vein configurations are scanned as proof of identity, and the technology is being integrated...

From ACM News

Intel Community's Sharing of Cyber Tools Raises Legal Questions

Before the establishment of U.S. Cyber Command in 2010, a combatant commander who wanted to take down an enemy’s surface-to-air missile sites or other defenses...

Is It Possible to Wage a Just Cyberwar?
From ACM Opinion

Is It Possible to Wage a Just Cyberwar?

In the last week or so, cyberwarfare has made front-page news: the United States may have been behind the Stuxnet cyberattack on Iran; Iran may have suffered another...

Stuxnet Expert Calls ­.s. the 'good Guys' in Cyber-Warfare
From ACM Opinion

Stuxnet Expert Calls ­.s. the 'good Guys' in Cyber-Warfare

Sitting in the front row for the first full day of the International Conference on Cyber Conflict was one of the industry’s foremost "rock star" researchers, ...

Nations Must Talk to Halt 'cyber Terrorism': Kaspersky
From ACM Opinion

Nations Must Talk to Halt 'cyber Terrorism': Kaspersky

Eugene Kaspersky, whose lab discovered the Flame virus that has attacked computers in Iran and elsewhere in the Middle East, said on Wednesday only a global effort...

Cyberthreats Turn Into Megabucks
From ACM Careers

Cyberthreats Turn Into Megabucks

As Congress boosts spending on cybersecurity and mulls over new data safety requirements on private industry, some companies stand to get rich.

Cyber-Attack Concerns Raised Over Boeing 787 Chip's 'back Door'
From ACM News

Cyber-Attack Concerns Raised Over Boeing 787 Chip's 'back Door'

Two Cambridge experts have discovered a "back door" in a computer chip used in military systems and aircraft, such as the Boeing 787, that could allow the chip...

Social Network Data Reveals Non-Members' Secrets
From ACM News

Social Network Data Reveals Non-Members' Secrets

People who avoid social networking sites to maintain their privacy may not be as secure as they think, German computer scientists say. 

Uh Students Develop Prototype Device that Translates Sign Language
From ACM TechNews

Uh Students Develop Prototype Device that Translates Sign Language

University of Houston researchers have developed the concept and prototype for MyVoice, a device that reads sign language and translates its motions into audible...

Idf Admits to Using Cyber Space to Attack Enemies
From ACM News

Idf Admits to Using Cyber Space to Attack Enemies

The IDF uses cyber space to gather intelligence, attack enemies, and conduct various military operations, the military revealed on Sunday in a posting on its official...

Technology to Monitor Bird Sounds, Impacts of Environmental Change
From ACM TechNews

Technology to Monitor Bird Sounds, Impacts of Environmental Change

Oregon State University researchers have developed a multi-instance, multi-label machine-learning system to simultaneously listen to multiple bird sounds.  

From ACM News

Iran: 'flame' Virus Fight Began with Oil Attack

Computer technicians battling to contain a complex virus last month resorted to the ultimate firewall measures—cutting off Internet links to Iran’s Oil Ministry...

A Dive Into the Digital Deep
From ACM News

A Dive Into the Digital Deep

When next winter's storms subside, a specialized ship will begin a slow crossing, lowering a skinny cable into its wake along a precisely prescribed path: the shortest...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account