acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Technology for the Deaf
From Communications of the ACM

Technology for the Deaf

Why aren't better assistive technologies available for those communicating using ASL?

This Company Is Helping Build China's Panopticon. It Won't Stop There 
From ACM Careers

This Company Is Helping Build China's Panopticon. It Won't Stop There 

The lobby of SenseTime's Beijing office makes you feel a bit like you've stumbled into a Philip K. Dick novel.

Learning to Attack the Cyberattackers Can't Happen Fast Enough
From ACM TechNews

Learning to Attack the Cyberattackers Can't Happen Fast Enough

Carnegie Mellon University's CyLab Security and Privacy Institute aims to expand the boundaries of technology and protect people when that technology or its users...

Spectre, Meltdown Researchers ­nveil 7 More Speculative Execution Attacks
From ACM News

Spectre, Meltdown Researchers ­nveil 7 More Speculative Execution Attacks

Systematic analysis reveals a range of new issues and a need for new mitigations.

AI Could Make Cyberattacks More Dangerous, Harder to Detect
From ACM TechNews

AI Could Make Cyberattacks More Dangerous, Harder to Detect

Scientists warn that hackers could weaponize artificial intelligence to conceal and accelerate cyberattacks and potentially escalate their damage.

New Attacks on Graphics Processors Endanger User Privacy
From ACM TechNews

New Attacks on Graphics Processors Endanger User Privacy

University of California, Riverside scientists have determined how hackers can exploit graphics processing units to expose private data.

Social Media Companies Grapple with New Forms of Political Misinformation
From ACM News

Social Media Companies Grapple with New Forms of Political Misinformation

Social media companies are struggling to contain new forms of political misinformation on their platforms that bubbled up during this year's midterm elections. ...

Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption
From ACM TechNews

Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption

Researchers have found vulnerabilities in some solid-state drives that allow hackers to circumvent encryption and access local data without knowing the password...

Intel CP­s Impacted by New PortSmash Side-Channel Vulnerability
From ACM TechNews

Intel CP­s Impacted by New PortSmash Side-Channel Vulnerability

Researchers discovered a new vulnerability in Intel processors that can allow attackers to leak encrypted data from the internal process of a central processing...

­sing Wi-Fi to 'See' Behind Closed Doors Is Easier than Anyone Thought
From ACM TechNews

­sing Wi-Fi to 'See' Behind Closed Doors Is Easier than Anyone Thought

Researchers have developed a technique to see through walls using ambient Wi-Fi signals and an ordinary smartphone.

At China’s Internet Conference, a Darker Side of Tech Emerges
From ACM News

At China’s Internet Conference, a Darker Side of Tech Emerges

Discussion topics included counterterrorism, data breaches, and surveillance.

Google in China: When 'Don't Be Evil' Met the Great Firewall
From ACM News

Google in China: When 'Don't Be Evil' Met the Great Firewall

If you're planning on moving to China anytime soon, here's a piece of advice: Get yourself a WeChat account.

In the Age of A.I., Is Seeing Still Believing?
From ACM News

In the Age of A.I., Is Seeing Still Believing?

In 2011, Hany Farid, a photo-forensics expert, received an e-mail from a bereaved father.

Stanford Researchers Develop New Data Privacy Technique
From ACM TechNews

Stanford Researchers Develop New Data Privacy Technique

A new system for aggregating data usage reports emphasizes maintaining personal privacy.

Chinese 'Gait Recognition' Tech IDs People by How They Walk
From ACM News

Chinese 'Gait Recognition' Tech IDs People by How They Walk

Chinese authorities have begun deploying a new surveillance tool: "gait recognition" software that uses people's body shapes and how they walk to identify them,...

FDA Not Doing Enough to Prevent Medical Device Hacking, HHS Report Says
From ACM TechNews

FDA Not Doing Enough to Prevent Medical Device Hacking, HHS Report Says

The U.S. Food and Drug Administration is not sufficiently protecting medical devices from being hacked, according to a U.S. Department of Health and Human Services...

­sing Wi-Fi to 'See' Behind Closed Doors Is Easier than Anyone Thought
From ACM News

­sing Wi-Fi to 'See' Behind Closed Doors Is Easier than Anyone Thought

Wi-Fi fills our world with radio waves. In your home, in the office, and increasingly on city streets, humans are bathed in a constant background field of 2.4-...

To Fight Email Scammers, Take a Different View. Literally.
From ACM TechNews

To Fight Email Scammers, Take a Different View. Literally.

Researchers have developed a visual analytics tool that dramatically speeds up forensic email investigations and highlights critical links within email data.

How to Encode a Secret Message in a Fingerprint
From ACM TechNews

How to Encode a Secret Message in a Fingerprint

Researchers have developed a method for constructing digital fingerprints that encode secret messages into the spiral points on the prints.

Even a Few Bots Can Shift Public Opinion in Big Ways
From ACM Opinion

Even a Few Bots Can Shift Public Opinion in Big Ways

Nearly two-thirds of the social media bots with political activity on Twitter before the 2016 U.S. presidential election supported Donald Trump.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account