acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hacker-Powered Security Is Reaching Critical Mass
From ACM TechNews

Hacker-Powered Security Is Reaching Critical Mass

Hackers are finding more severe vulnerabilities than ever before, as the total number of high or critical severity vulnerabilities identified increased 22% last...

New Model for Large-Scale 3D Facial Recognition
From ACM TechNews

New Model for Large-Scale 3D Facial Recognition

University of Western Australia researchers have developed a three-dimensional facial recognition system.

Looking Through the Eyes of China's Surveillance State
From ACM Opinion

Looking Through the Eyes of China's Surveillance State

They perch on poles and glare from streetlamps. Some hang barely visible in the ceiling of the subway, and others seem to stretch out on braced necks and peer into...

Inside Facebook, Twitter and Google's AI Battle Over Your Social Lives
From ACM News

Inside Facebook, Twitter and Google's AI Battle Over Your Social Lives

When you sign up for Facebook on your phone, the app isn't just giving you the latest updates and photos from your friends and family.

Microsoft Calls for Regulation of Facial Recognition, Saying It's Too Risky to Leave to Tech Industry Alone
From ACM News

Microsoft Calls for Regulation of Facial Recognition, Saying It's Too Risky to Leave to Tech Industry Alone

Microsoft is calling for government regulation on facial-recognition software, one of its key technologies, saying such artificial intelligence is too important...

White House Earmarks Over $1B for Quantum Technology Research
From ACM TechNews

White House Earmarks Over $1B for Quantum Technology Research

The White House has established an Office of Science and Technology Policy subcommittee to oversee federal backing and investment for quantum technology research...

How Rare Earths (What?) Could Be Crucial in a ­.S.-China Trade War
From ACM News

How Rare Earths (What?) Could Be Crucial in a ­.S.-China Trade War

Amanda Lacaze grabbed her iPhone and rattled off the names of the special minerals needed to make it.

Facebook's Push for Facial Recognition Prompts Privacy Alarms
From ACM News

Facebook's Push for Facial Recognition Prompts Privacy Alarms

When Facebook rolled out facial recognition tools in the European Union this year, it promoted the technology as a way to help people safeguard their online identities...

Researchers Discover Android Apps Spying on ­sers' Screens
From ACM TechNews

Researchers Discover Android Apps Spying on ­sers' Screens

An analysis of Android apps found “several” clandestinely recording and sharing video and images of users' screens.

How to Stop Artificial Intelligence Being Biased
From ACM TechNews

How to Stop Artificial Intelligence Being Biased

Researchers at the Max Planck Institute for Intelligent Systems in Germany have developed a new method to avoid embedding bias into machine learning algorithms....

HHS Is ­sing Data to Fight Opioid Abuse, Fraud, and Just About Everything Else
From ACM TechNews

HHS Is ­sing Data to Fight Opioid Abuse, Fraud, and Just About Everything Else

The U.S. Department of Health and Human Services' Office of Inspector General is using refined data analytics to combat medical fraud, waste, and abuse.

Dutch Police Fight Crime by Cracking PGP Phones
From ACM News

Dutch Police Fight Crime by Cracking PGP Phones

Forensic hacking puts criminals behind bars.

Inside China's Dystopian Dreams: A.I., Shame and Lots of Cameras
From ACM News

Inside China's Dystopian Dreams: A.I., Shame and Lots of Cameras

In the Chinese city of Zhengzhou, a police officer wearing facial recognition glasses spotted a heroin smuggler at a train station.

4G Is Vulnerable to Same Types of Attacks as 3G, Researchers Say
From ACM TechNews

4G Is Vulnerable to Same Types of Attacks as 3G, Researchers Say

A new report has found the 4G wireless telecommunications protocol is susceptible to the same types of remote exploitation as 3G.

In Search of New Rules to Protect Other Worlds From Earth's Cooties
From ACM News

In Search of New Rules to Protect Other Worlds From Earth's Cooties

NASA has to start protecting planets better. The international treaty governing space—there is one—and the laws and regulations that follow it date back to the...

I Never Said That! High-Tech Deception of 'Deepfake' Videos
From ACM News

I Never Said That! High-Tech Deception of 'Deepfake' Videos

Hey, did my congressman really say that? Is that really President Donald Trump on that video, or am I being duped?

Time Split to the Nanosecond Is Precisely What Wall Street Wants
From ACM News

Time Split to the Nanosecond Is Precisely What Wall Street Wants

Computer scientists at Stanford University and Google have created technology that can track time down to 100 billionths of a second. It could be just what Wall...

Why Are Countries Creating Public Random Number Generators?
From ACM News

Why Are Countries Creating Public Random Number Generators?

In Chile, politicians resent the Comptroller General, which audits government officials to prevent corruption.

China's Penetration of Silicon Valley Creates Risks for Startups
From ACM Careers

China's Penetration of Silicon Valley Creates Risks for Startups


Wi-Fi Security Is Starting to Get its Biggest ­pgrade in Over a Decade
From ACM TechNews

Wi-Fi Security Is Starting to Get its Biggest ­pgrade in Over a Decade

The Wi-Fi Alliance has begun certifying products that support WPA3, a major security advance over the WPA2 protocol that has been in use since 2004.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account