acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Google Study Finds Phishing Is Top Online Threat
From ACM TechNews

Google Study Finds Phishing Is Top Online Threat

Internet data breaches threaten the usernames and passwords of billions of people, and phishing attacks are the most effective way to hijack victims' online identities...

Training For Artificial Intelligence in Warfare
From ACM TechNews

Training For Artificial Intelligence in Warfare

Governments are taking a closer look at artificial intelligence as a way to further their strategic interests in areas such as national defense.

Why They Dox: First Large-Scale Study Reveals Top Motivations and Targets For This Form of Cyber Bullying
From ACM TechNews

Why They Dox: First Large-Scale Study Reveals Top Motivations and Targets For This Form of Cyber Bullying

Researchers say they have published the first large-scale study of doxing.

Only If It Serves the State: North Korea's Online Experience 
From ACM News

Only If It Serves the State: North Korea's Online Experience 

Ever so cautiously, North Korea is going online.

Texas Gunman's Iphone Could Reignite Fbi-Apple Feud Over Encryption
From ACM News

Texas Gunman's Iphone Could Reignite Fbi-Apple Feud Over Encryption

The FBI and Apple are bracing for another potential fight over encryption, this time because of the iPhone of the dead gunman in Sunday's Texas church shooting,...

Law Enforcement’s Ongoing Problem with Mobile Encryption
From ACM News

Law Enforcement’s Ongoing Problem with Mobile Encryption

Organizations like the U.S. Federal Bureau of Investigation have a hard time cracking suspects' smartphones, thanks to end-to-end encryption.

Fbi Again Finds Itself ­nable to ­nlock a Gunman's Cellphone
From ACM News

Fbi Again Finds Itself ­nable to ­nlock a Gunman's Cellphone

The Texas church massacre is providing a familiar frustration for law enforcement: FBI agents are unable to unlock the gunman's encrypted cellphone to learn what...

China's Technology Ambitions Could ­pset the Global Trade Order
From ACM News

China's Technology Ambitions Could ­pset the Global Trade Order

When President Trump arrives in Beijing on Wednesday, he will most likely complain about traditional areas of dispute like steel and cars.

A Third of the Internet Is ­nder Attack
From ACM TechNews

A Third of the Internet Is ­nder Attack

Researchers completing the first large-scale analysis of victims of Internet denial-of-service attacks worldwide found about a third of the IPv4 address space was...

Researcher: 'we Should Be Worried' This Computer Thought a Turtle Was a Gun
From ACM TechNews

Researcher: 'we Should Be Worried' This Computer Thought a Turtle Was a Gun

The Massachusetts Institute of Technology's LabSix artificial intelligence team has demonstrated the first example of a three-dimensional object becoming "adversarial"...

A Better Technique For Spotting Bugs in Self-Driving AI Could Save Lives
From ACM News

A Better Technique For Spotting Bugs in Self-Driving AI Could Save Lives

Most software bugs won't kill you.

Captcha Is Dying. This Is How It's Being Reinvented For the AI Age
From ACM TechNews

Captcha Is Dying. This Is How It's Being Reinvented For the AI Age

Completely Automated Public Turing Tests to tell Computers and Humans Apart (CAPTCHAs) appear to be heading toward obsolescence.

Smart Access to Homes and Cars ­sing Fingers
From ACM TechNews

Smart Access to Homes and Cars ­sing Fingers

Researchers at Rutgers University have developed a low-cost, minimal-power smart access system that can authenticate users by sensing their finger vibrations.

Russian Ads, Now Publicly Released, Show Sophistication of Influence Campaign
From ACM News

Russian Ads, Now Publicly Released, Show Sophistication of Influence Campaign

Lawmakers on Wednesday released a trove of ads that Russian operatives bought on Facebook, providing the fullest picture yet of how foreign actors sought to promote...

Small Words in an Email Can Reveal a Person's Identity
From ACM TechNews

Small Words in an Email Can Reveal a Person's Identity

Researchers have demonstrated it is possible to identify someone by analyzing small sequences of words in emails.

To Secure the Internet of Things, We Must Build It Out of 'patchable' Hardware
From ACM TechNews

To Secure the Internet of Things, We Must Build It Out of 'patchable' Hardware

The security of the Internet of Things could depend on its constituent hardware being "patchable" so it can adapt to future threats, write several experts.

Sharing Secrets (without Giving Them Away)
From ACM News

Sharing Secrets (without Giving Them Away)

Secure multiparty computation protects privacy while sharing vital data.

How Russian Trolls Lie Their Way to the Top of Your News Feed
From ACM News

How Russian Trolls Lie Their Way to the Top of Your News Feed

Going viral used to be harmless.

Facebook Struggles to Contain Russia Narrative
From ACM Careers

Facebook Struggles to Contain Russia Narrative

Facebook has been happy to keep congressional investigators focused on the Russian-bought online ads that helped sway voters in last year's election—despite the...

Secure Payment Without Leaving a Trace
From ACM TechNews

Secure Payment Without Leaving a Trace

Researchers in Germany have developed a secure system for making online payments that that works anonymously and prevents misuse.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account