acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Problem With Google's 'star Trek' Computer
From ACM Opinion

The Problem With Google's 'star Trek' Computer

Google is hoping to develop its Assistant, a Siri-like technology to be included on the company's new smartphones and other products, into something like the computer...

How to Steal the Mind of an AI
From ACM TechNews

How to Steal the Mind of an AI

Machine-learning models can be reverse engineered, and basic safeguards are little help in ameliorating attacks, according to a paper presented at the 25th Annual...

How to Steal an AI
From ACM News

How to Steal an AI

In the burgeoning field of computer science known as machine learning, engineers often refer to the artificial intelligences they create as "black box" systems:...

Why Apple Can Be Forced to Turn Logs of Your Imessage Contacts Over to Police
From ACM News

Why Apple Can Be Forced to Turn Logs of Your Imessage Contacts Over to Police

When a user sends someone a message through Apple's iMessage feature, Apple encrypts that message between Apple devices so that only the sender and recipient can...

The Computer Voting Revolution Is Already Crappy, Buggy, and Obsolete
From ACM News

The Computer Voting Revolution Is Already Crappy, Buggy, and Obsolete

Six days after Memphis voters went to the polls last October to elect a mayor and other city officials, a local computer programmer named Bennie Smith sat on his...

Will Driverless-Car Makers Learn to Share?
From ACM News

Will Driverless-Car Makers Learn to Share?

Last Monday, the Obama Administration released a hundred-and-twelve-page policy tome, "Federal Automated Vehicles Policy," which, despite its sleep-inducing title...

Iarpa to Develop Early-Warning System For Cyberattacks
From ACM TechNews

Iarpa to Develop Early-Warning System For Cyberattacks

The U.S. Intelligence Advanced Research Projects Activity has launched a multi-year initiative to create technologies that could provide early warning of cyberattacks...

Hackers Infect Army of Cameras, Dvrs For Massive Internet Attacks
From ACM News

Hackers Infect Army of Cameras, Dvrs For Massive Internet Attacks

Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks last week, prompting fresh concern about the...

Computer Researcher to Congress: 'it's Possible' For Hackers to Alter Election
From ACM News

Computer Researcher to Congress: 'it's Possible' For Hackers to Alter Election

Hackers could influence the outcomes of November’s elections, a computer science professor who has demonstrated security weaknesses in voting machines told lawmakers...

Eavesdropping Prohibited
From ACM TechNews

Eavesdropping Prohibited

Researchers want to automate encryption so software developers can correctly integrate cryptographic protocols into applications that communicate over the Internet...

Hacking, Cryptography, and the Countdown to Quantum Computing
From ACM News

Hacking, Cryptography, and the Countdown to Quantum Computing

Given the recent ubiquity of cyber-scandals—Colin Powell’s stolen e-mails, Simone Biles's leaked medical records, half a billion plundered Yahoo accounts—you might...

Online Trackers Follow Our Digital Shadow By 'fingerprinting' Browsers, Devices
From ACM Opinion

Online Trackers Follow Our Digital Shadow By 'fingerprinting' Browsers, Devices

As we surf from website to website, we are being tracked—that's not news. What is news, revealed in a recent paper by researchers at Princeton University, is that...

The New Face of Biometrics
From ACM News

The New Face of Biometrics

Advances in biometric authentication are finally pushing the technology into the mainstream.

Building a Bionic Spine
From ACM News

Building a Bionic Spine

Australian neurologist Tom Oxley was on vacation in the US in November 2010 when he decided to do a bit of work.

Stealing an AI Algorithm and Its ­nderlying Data Is a 'high-School Level Exercise'
From ACM TechNews

Stealing an AI Algorithm and Its ­nderlying Data Is a 'high-School Level Exercise'

Cornell Tech researchers have shown they can reverse-engineer machine-learning algorithms, essentially stealing artificial intelligence products and using them...

Germany to Create World's First Highway Code For Driverless Cars
From ACM TechNews

Germany to Create World's First Highway Code For Driverless Cars

The first legal framework for autonomous vehicles was outlined in a recently proposed bill in Germany governing how such cars perform in potentially deadly crashes...

Vint Cerf's Dream Do-Over: 2 Ways He'd Make the Internet Different
From ACM TechNews

Vint Cerf's Dream Do-Over: 2 Ways He'd Make the Internet Different

Google chief Internet evangelist and former ACM president Vint Cerf said he would change a few things about the Internet's creation if he could do it over again...

We Have to Start Thinking About Cybersecurity in Space
From ACM TechNews

We Have to Start Thinking About Cybersecurity in Space

U.K.-based researchers are studying the cybersecurity of space-related technologies. 

The Wikipedia Bots that Are Engaged in Spats that Never End
From ACM Careers

The Wikipedia Bots that Are Engaged in Spats that Never End

Is. Isn't. Is. Isn’t. Is. Isn't.

Battling Algorithmic Bias
From Communications of the ACM

Battling Algorithmic Bias

How do we ensure algorithms treat us fairly?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account