acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hack Apple, Get Paid – By Apple
From ACM News

Hack Apple, Get Paid – By Apple

In a first for Apple, the company will pay up to $200,000 to researchers who find security problems in its systems.

Pentagon Bot Battle Shows How Computers Can Fix Their Own Flaws
From ACM News

Pentagon Bot Battle Shows How Computers Can Fix Their Own Flaws

It might be the least spectacular show to ever grace a Las Vegas stage.

Retroscope Opens Doors to the Past in Smartphone Investigations
From ACM TechNews

Retroscope Opens Doors to the Past in Smartphone Investigations

Researchers at Purdue University are developing a technique that could help law enforcement recover evidence from smartphones when investigating crimes.

Here's How Government Thinks Nanotech Will Transform Cyber
From ACM TechNews

Here's How Government Thinks Nanotech Will Transform Cyber

A group of U.S. federal organizations think brain-inspired nanotechnology could help the government protect its networks.

Google's Driverless-Car Czar on Taking the Human Out of the Equation
From ACM Opinion

Google's Driverless-Car Czar on Taking the Human Out of the Equation

You devoted your life to human-driven transportation, engineering SUVs at Ford and taking Hyundai (as U.S. CEO and president) to record levels of sales in the U...

Frequent Password Changes Are the Enemy of Security, Ftc Technologist Says
From ACM News

Frequent Password Changes Are the Enemy of Security, Ftc Technologist Says

Shortly after Carnegie Mellon University professor Lorrie Cranor became chief technologist at the Federal Trade Commission in January, she was surprised by an ...

How Vulnerable to Hacking Is the U.s. Election Cyber Infrastructure?
From ACM TechNews

How Vulnerable to Hacking Is the U.s. Election Cyber Infrastructure?

Adversaries' growing use of cyberweapons to influence target groups in the U.S. is provoking concern that the U.S. electoral process is at risk.

Hackers Hijack a Big Rig Truck's Accelerator and Brakes
From ACM News

Hackers Hijack a Big Rig Truck's Accelerator and Brakes

When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles' brakes or hijack their steering...

America's Electronic Voting Machines Are Scarily Easy Targets
From ACM News

America's Electronic Voting Machines Are Scarily Easy Targets

This week, GOP presidential candidate Donald Trump openly speculated that this election would be "rigged." Last month, Russia decided to take an active role in...

Your Battery Status Is Being Used to Track You Online
From ACM News

Your Battery Status Is Being Used to Track You Online

A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online, a year after ...

Can Machines Keep ­S Safe from Cyber-Attack?
From ACM News

Can Machines Keep ­S Safe from Cyber-Attack?

Best known for its part in bringing the internet into being, the Defence Advanced Research Projects Agency has more recently brought engineers together to tackle...

Snapping ­p Cheap Spy Tools, Nations 'monitoring Everyone'
From ACM News

Snapping ­p Cheap Spy Tools, Nations 'monitoring Everyone'

It was a national scandal. Peru's then-vice president accused two domestic intelligence agents of staking her out.

How to Make Democracy Harder to Hack
From ACM TechNews

How to Make Democracy Harder to Hack

With voting machines and related tools under threat by cybercriminals, the pressure is on to bolster the security of democratic infrastructure.

How Tech Breakthroughs Can Shatter the Bonds of Poverty
From ACM TechNews

How Tech Breakthroughs Can Shatter the Bonds of Poverty

Digital financial services can provide banking, insurance, and lending to the poor in emerging markets.

How To Fool AI Into Seeing Something That Isn't There
From ACM News

How To Fool AI Into Seeing Something That Isn't There

Our machines are littered with security holes, because programmers are human.

Machines v. Hackers: Cybersecurity's Artificial Intelligence Future
From ACM TechNews

Machines v. Hackers: Cybersecurity's Artificial Intelligence Future

Experts predict machines will perform increasingly complex cybersecurity operations over time, reducing the need for humans and facilitating a paradigm shift in...

Baidu ­ses Millions of ­sers' Location Data to Make Predictions
From ACM News

Baidu ­ses Millions of ­sers' Location Data to Make Predictions

Baidu, China's internet giant, has shown what you can learn when you have access to enough location data.

Chinese Satellite Is One Giant Step For the Quantum Internet
From ACM News

Chinese Satellite Is One Giant Step For the Quantum Internet

China is poised to launch the world's first satellite designed to do quantum experiments. A fleet of quantum-enabled craft is likely to follow.

European Scientific Community Seeks Support For 5.3-Million-Euro Hybrid Cloud Build
From ACM TechNews

European Scientific Community Seeks Support For 5.3-Million-Euro Hybrid Cloud Build

Ten European research organizations support an initiative to create a 5.3-million-euro hybrid cloud platform for the European scientific community.

­pcoming Tor Design Battles Hidden Services Snooping
From ACM TechNews

­pcoming Tor Design Battles Hidden Services Snooping

Tor project representatives say malicious Tor Hidden Services Directories will be addressed in an upcoming redesign, and are only an "annoyance" in the meantime...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account