acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Artificial Intelligence Is Far From Matching Humans, Panel Says
From ACM News

Artificial Intelligence Is Far From Matching Humans, Panel Says

Never mind Terminator-like killer robots. Artificial intelligence researchers are grappling with more realistic questions like whether their creations will take...

Shortened ­rls May Open a Window on Your Life
From ACM TechNews

Shortened ­rls May Open a Window on Your Life

The trend of using shortened URLs offers a new opportunity for hackers to invade users' privacy, according to Cornell Tech researchers. 

Checklist of Worst-Case Scenarios Could Help Prepare For Evil AI
From ACM TechNews

Checklist of Worst-Case Scenarios Could Help Prepare For Evil AI

University of Louisville researcher Roman Yampolskiy and hacktivist Federico Pistono are examining worst-case scenarios for a potential malevolent artificial intelligence...

How the Constant Threat of War Shaped Israel's Tech Industry
From ACM Careers

How the Constant Threat of War Shaped Israel's Tech Industry

Unit 8200 is Israel's most mysterious agency. No one outside knows exactly how it operates, who works there, or how they learn.

Face Recognition App Taking Russia By Storm May Bring End to Public Anonymity
From ACM News

Face Recognition App Taking Russia By Storm May Bring End to Public Anonymity

If the founders of a new face recognition app get their way, anonymity in public could soon be a thing of the past.

Computing a Secret, ­nbreakable Key
From ACM TechNews

Computing a Secret, ­nbreakable Key

Researchers say they have developed the first available software to evaluate the security protocol for Quantum Key Distribution.

Study Reveals Only 1 in 6 Drivers Want Fully-Autonomous Vehicles
From ACM TechNews

Study Reveals Only 1 in 6 Drivers Want Fully-Autonomous Vehicles

Most U.S. drivers do not want to own a fully self-driving car in the future, according to a University of Michigan survey. 

China's Scary Lesson to the World: Censoring the Internet Works.
From ACM News

China's Scary Lesson to the World: Censoring the Internet Works.

First there was the Berlin Wall. Now there is the Great Firewall of China, not a physical barrier preventing people from leaving, but a virtual one, preventing...

Physicists Discover a New Form of Light
From ACM News

Physicists Discover a New Form of Light

Physicists from Trinity College Dublin's School of Physics and the CRANN Institute, Trinity College, have discovered a new form of light, which will impact our...

The Key to Privacy
From Communications of the ACM

The Key to Privacy

40 years ago, Whitfield Diffie and Martin E. Hellman introduced the public key cryptography used to secure today's online transactions.

How to Create a Malevolent Artificial Intelligence
From ACM TechNews

How to Create a Malevolent Artificial Intelligence

University of Louisville researchers are studying how malevolent artificial intelligenes might be designed, and the conditions in which they might be create.

China Quietly Targets ­.s. Tech Companies in Security Reviews
From ACM Careers

China Quietly Targets ­.s. Tech Companies in Security Reviews

Chinese authorities are quietly scrutinizing technology products sold in China by Apple and other big foreign companies, focusing on whether they pose potential...

Largest Study of Online Tracking Proves Google Really Is Watching ­S All
From ACM TechNews

Largest Study of Online Tracking Proves Google Really Is Watching ­S All

Researchers at Princeton University say they have conducted the largest study yet on the technology that tracks people's movements around the Web. 

How to Create a Malevolent Artificial Intelligence
From ACM News

How to Create a Malevolent Artificial Intelligence

The possibility that a malevolent artificial intelligence might pose a serious threat to humankind has become a hotly debated issue.

Technique Makes Holograms Highly Efficient, Secure
From ACM TechNews

Technique Makes Holograms Highly Efficient, Secure

Harvard University researchers have programmed polarization into compact holograms.

America Is 'Dropping Cyberbombs'—But How Do They Work?
From ACM News

America Is 'Dropping Cyberbombs'—But How Do They Work?

Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was "dropping cyberbombs," taking its ongoing...

We Know Where You Live
From ACM TechNews

We Know Where You Live

Researchers have demonstrated that snoopers armed with little sophisticated technology can expose the home and workplace addresses of Twitter users. 

More Than 30 States Offer Online Voting, but Experts Warn It Isn't Secure
From ACM TechNews

More Than 30 States Offer Online Voting, but Experts Warn It Isn't Secure

More than 30 states will be hosting online voting systems by the time of the U.S. presidential election in November, but experts warn such systems are still insecure...

Nsa Can Legally Access Metadata of 25,000 Callers Based on a Single Suspect's Phone
From ACM News

Nsa Can Legally Access Metadata of 25,000 Callers Based on a Single Suspect's Phone

Despite changes to the law, the U.S. National Security Agency can still request metadata from tens of thousands of private phones if they are indirectly connected...

How to Make Passwords That Cannot Be Compromised By Torture or Coercion
From ACM TechNews

How to Make Passwords That Cannot Be Compromised By Torture or Coercion

Researchers have hypothesized a method to measure an individual's stress levels and determine whether they are being coerced into revealing a password. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account