acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Malware Can Steal Data From Air-Gapped Devices via Fans
From ACM TechNews

Malware Can Steal Data From Air-Gapped Devices via Fans

Researchers from Ben-Gurion University of the Negev report data can be stolen from an air-gapped computer using the computer's fan to a nearby mobile phone equipped...

Edward Snowden Denounces Russia's New 'big Brother' Surveillance Bill
From ACM News

Edward Snowden Denounces Russia's New 'big Brother' Surveillance Bill

Edward Snowden has been in exile in Russia since 2013, when he leaked classified documents about the National Security Agency's mass surveillance programs.

The Top 10 Emerging Technologies of 2016
From ACM TechNews

The Top 10 Emerging Technologies of 2016

The World Economic Forum has published its annual list of 2016's breakthrough technologies, with a specific focus on closing the gaps in investment and regulation...

Bletchley Park in 360: See Inside Britain's Enigma-Breaking Hq
From ACM News

Bletchley Park in 360: See Inside Britain's Enigma-Breaking Hq

In a special video production, CNET takes you inside the hallowed halls of Bletchley Park, the stately home in Buckinghamshire, England where the Enigma code was...

Should Your Driverless Car Hit a Pedestrian to Save Your Life?
From ACM TechNews

Should Your Driverless Car Hit a Pedestrian to Save Your Life?

Most people believe self-driving vehicles should ultimately put their passengers' lives first, according to a new study.

Booming Enrollments
From Communications of the ACM

Booming Enrollments

The Computing Research Association works to quantify the extent, and causes, of a jump in undergraduate computer science enrollments.

Goodbye, Password. Banks Opt to Scan Fingers and Faces Instead.
From ACM News

Goodbye, Password. Banks Opt to Scan Fingers and Faces Instead.

The banking password may be about to expire—forever.

Drivers, These Robots Have Your Back
From ACM News

Drivers, These Robots Have Your Back

Automated safety systems can prevent an accident before the driver is even aware of the possibility.

Vulnerabilities in Internet Encryption Protocol
From ACM TechNews

Vulnerabilities in Internet Encryption Protocol

Successful test attacks against the Transport Layer Security Internet encryption protocol generated data that will be incorporated into the latest TLS iteration...

'ransomware' Cyberattack Highlights Vulnerability of ­niversities
From ACM News

'ransomware' Cyberattack Highlights Vulnerability of ­niversities

The first Patrick Feng knew about a cyberattack on his university was when one of his colleagues told him that her computer had been infected by hackers and rendered...

Here's Your Chance to Decode President Lincoln's Secret Messages
From ACM Opinion

Here's Your Chance to Decode President Lincoln's Secret Messages

On April 12, 1865—three days after Gen. Robert E. Lee surrendered at Appomattox and two days before President Abraham Lincoln was assassinated—the president sent...

Malware, Data Theft, and Scams: Researchers Expose Risks of Free Livestreaming Websites
From ACM TechNews

Malware, Data Theft, and Scams: Researchers Expose Risks of Free Livestreaming Websites

Researchers found free livestreaming services users often are exposed to malware infections, personal data theft, and scams.

Keyboard Warriors: South Korea Trains New Frontline in Decades-Old War with North
From ACM Careers

Keyboard Warriors: South Korea Trains New Frontline in Decades-Old War with North

In one college major at Seoul's elite Korea University, the courses are known only by number, and students keep their identities a secret from outsiders.

Smile, You're in the Fbi Face-Recognition Database
From ACM News

Smile, You're in the Fbi Face-Recognition Database

The Federal Bureau of Investigation has access to as many as 411.9 million images as part of its face-recognition database. 

Cybercrime Market Sells Servers For as Little as 6 Dollars to Launch Attacks
From ACM News

Cybercrime Market Sells Servers For as Little as 6 Dollars to Launch Attacks

A major underground marketplace acting like an eBay for criminals is selling access to more than 70,000 compromised servers allowing buyers to carry out widespread...

Goodbye, Obamaberry. Hello, Obamadroid.
From ACM News

Goodbye, Obamaberry. Hello, Obamadroid.

When President Barack Obama took office in 2009, he pushed to keep his BlackBerry.

Silicon Fingerprint on Chips Could Make Any Gadget Unhackable
From ACM TechNews

Silicon Fingerprint on Chips Could Make Any Gadget Unhackable

At least one U.S. bank has started supplying its customers with credit and debit cards that contain a physically unclonable function. 

On Her Microphone's Secret Service: How Spies, Anyone Can Grab Crypto Keys from the Air
From ACM News

On Her Microphone's Secret Service: How Spies, Anyone Can Grab Crypto Keys from the Air

Discerning secret crypto keys in computers and gadgets by spying on how they function isn't new, although the techniques used are often considered impractical.

Automatic Debugging of Software
From ACM TechNews

Automatic Debugging of Software

Singapore Management University researchers have developed an automated approach for debugging software that combines elements of previous solutions. 

Going Digital May Make Analog Quantum Computer Scaleable
From ACM News

Going Digital May Make Analog Quantum Computer Scaleable

There are many different schemes for making quantum computers work (most of them evil). But they pretty much all fall into two categories.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account