acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How a Supervillain (or a Hacker in His Basement) Could Destroy the Internet
From Communications of the ACM

How a Supervillain (or a Hacker in His Basement) Could Destroy the Internet

Network experts share their greatest fears about attacks and accidents that could destroy the Internet.

In Privacy Law, It's the U.S. vs. the World
From Communications of the ACM

In Privacy Law, It's the U.S. vs. the World

Snowden revelations force changes, but Facebook (and others) resist.

British Voice Encryption Protocol Has Massive Weakness, Researcher Says
From ACM TechNews

British Voice Encryption Protocol Has Massive Weakness, Researcher Says

A researcher charges the protocol created by a U.K. governmental group to encrypt voice calls has a weakness built into it by design that could enable mass surveillance...

­.s. Military Wants to Create Cyborg Soldiers
From ACM TechNews

­.s. Military Wants to Create Cyborg Soldiers

The U.S. Defense Advanced Research Projects Agency is working to create a chip to implant in a soldier's brain to connect it directly to computers. 

German ­niversity Reports Severe Software Vulnerabilities ­p in 2015
From ACM TechNews

German ­niversity Reports Severe Software Vulnerabilities ­p in 2015

Fewer software security vulnerabilities were reported worldwide in 2015 than in 2014, but the number of published vulnerabilities with a high level of severity...

Bridging the Bio-Electronic Divide
From ACM News

Bridging the Bio-Electronic Divide

A new DARPA program aims to develop an implantable neural interface able to provide unprecedented signal resolution and data-transfer bandwidth between the human...

Shrinking the Haystack
From ACM TechNews

Shrinking the Haystack

Technologists are helping counter-terrorist forces with software that can identify locations to be searched for hideouts and weapons, or be put under surveillance...

Malicious Coders Will Lose Anonymity as Identity-Finding Research Matures
From ACM TechNews

Malicious Coders Will Lose Anonymity as Identity-Finding Research Matures

Researchers from three universities and the U.S. Army Research Laboratory are trying to address the problem of identifying authors of malicious code and software...

For Now, Self-Driving Cars Still Need Humans
From ACM News

For Now, Self-Driving Cars Still Need Humans

Car enthusiasts, after hearing industry executives discussing the self-driving technology being built into their vehicles, might be forgiven for thinking robotic...

New App 'hides' ­ser Location From Third Parties
From ACM TechNews

New App 'hides' ­ser Location From Third Parties

A new app blocks third parties from identifying an individual's location based on what they search for online. 

Wikipedia Turns 15
From ACM Opinion

Wikipedia Turns 15

It must be difficult for the roughly half a billion people who visit Wikipedia every month to remember a world without the free online encyclopedia.

The Convenience-Surveillance Tradeoff
From ACM News

The Convenience-Surveillance Tradeoff

People love free stuff. That's the principle that helps explain the complicated series of privacy-related calculations that modern life increasingly requires.

Shrouding Oneself in Secrecy
From ACM News

Shrouding Oneself in Secrecy

Identity cloaking tools, developed to protect the privacy of Internet users, are being used to skirt cybersecurity and international law.

­w Computer Scientists to Make Financial Products Better and More Available For the Poor
From ACM TechNews

­w Computer Scientists to Make Financial Products Better and More Available For the Poor

University of Washington computer scientists and engineers plan to develop, test, and deploy technologies to make financial applications more available to the poor...

An Easy Way For Hackers to Remotely Burn Industrial Motors
From ACM News

An Easy Way For Hackers to Remotely Burn Industrial Motors

Hacks that cause physical destruction are so rare they can be counted on one hand.

Prediction Machines Will See the Future For Hedge Funds, CIA
From ACM News

Prediction Machines Will See the Future For Hedge Funds, CIA

Every time a new year rolls in, lots of people make predictions. Most will either be obvious (Apple will put out some new products) or wrong (still waiting for...

Researchers Find Two Flaws in Oauth 2.0
From ACM TechNews

Researchers Find Two Flaws in Oauth 2.0

Researchers have discovered vulnerabilities in the OAuth 2.0 authentication protocol that could enable hackers to subvert single sign-on systems. 

Cybersecurity Experts Debate Proper Response to Terrorism
From ACM TechNews

Cybersecurity Experts Debate Proper Response to Terrorism

Recent terror attacks are spurring calls for greater government access to electronic communications, but privacy advocates and cybersecurity experts disagree. 

­.s. Meets Tech Leaders, Forms Task Force to Fight Online Militants
From ACM News

­.s. Meets Tech Leaders, Forms Task Force to Fight Online Militants

The Obama administration on Friday sent its top national security officials to meet tech industry leaders in Silicon Valley and announced a new task force to counter...

Computer Scientists Launch Campaign to Guarantee Bug-Free Software
From ACM TechNews

Computer Scientists Launch Campaign to Guarantee Bug-Free Software

A multi-university consortium aspires to stamp out software bugs with the help of a five-year, $10-million grant from the U.S. National Science Foundation. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account