acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


'faceless Recognition System' Can Identify You Even When You Hide Your Face
From ACM News

'faceless Recognition System' Can Identify You Even When You Hide Your Face

With widespread adoption among law enforcement, advertisers, and even churches, face recognition has undoubtedly become one of the biggest threats to privacy out...

The Bandwidth Bottleneck that Is Throttling the Internet
From ACM News

The Bandwidth Bottleneck that Is Throttling the Internet

On 19 June, several hundred thousand US fans of the television drama Game of Thrones went online to watch an eagerly awaited episode—and triggered a partial failure...

Thanks to This Man, Airplanes Don’t Crash Into Mountains Anymore
From ACM Careers

Thanks to This Man, Airplanes Don’t Crash Into Mountains Anymore

Giant flocks of black birds circled the wreckage of an airliner that had struck an Alaska mountain two weeks earlier, killing all 111 aboard.

Where in the World Is My Data and How Secure Is It?
From ACM News

Where in the World Is My Data and How Secure Is It?

When Max Schrems, an Austrian privacy activist, requested to see his personal data that Facebook stored on its servers, he was mailed a CD-ROM containing a 1,222...

Fbi Chief Comey: 'we Have Never Had Absolute Privacy'
From ACM News

Fbi Chief Comey: 'we Have Never Had Absolute Privacy'

FBI Director James Comey has some phones—650 of them, to be exact—that he'd really, really like to take a look at.

How to Give Rural America Broadband? Look to the Early 1900s
From ACM News

How to Give Rural America Broadband? Look to the Early 1900s

From the sofa in his living room, Clinton Creason can see the electric pole outside that his father staked 70 years ago to bring power to this remote area of hilly...

How to Hack an Election in 7 Minutes
From ACM News

How to Hack an Election in 7 Minutes

When Princeton professor Andrew Appel decided to hack into a voting machine, he didn't try to mimic the Russian attackers who hacked into the Democratic National...

Cyber Protections Contemplated For U.s. Election Systems
From ACM TechNews

Cyber Protections Contemplated For U.s. Election Systems

The Obama administration is considering boosting cyber protections for U.S. election systems by classifying them as critical infrastructure.

Flexible Wearable Electronic Skin Patch Offers New Way to Monitor Alcohol Levels
From ACM TechNews

Flexible Wearable Electronic Skin Patch Offers New Way to Monitor Alcohol Levels

University of California, San Diego researchers have developed a wearable sensor that can accurately monitor alcohol level within 15 minutes.

Def Con: Do Smart Devices Mean Dumb Security?
From ACM News

Def Con: Do Smart Devices Mean Dumb Security?

More and more people are finding that the devices forming this network of smart stuff can make their lives easier.

Machine-Learning Algorithm Combs the Darknet For Zero Day Exploits, and Finds Them
From ACM News

Machine-Learning Algorithm Combs the Darknet For Zero Day Exploits, and Finds Them

In February 2015, Microsoft identified a critical vulnerability in its Windows operating system that potentially allowed a malicious attacker to remotely control...

Good News—the Robocalling Scourge May Not Be Unstoppable After All
From ACM News

Good News—the Robocalling Scourge May Not Be Unstoppable After All

New data shows that the majority of robot-enabled scam phone calls came from fewer than 40 call centers, a finding that offers hope the growing menace of robocalls...

Legal Confusion Threatens to Slow Data Science
From ACM News

Legal Confusion Threatens to Slow Data Science

Knowledge from millions of biological studies encoded into one network—that is Daniel Himmelstein's alluring description of Hetionet, a free online resource that...

Retroscope Opens Doors to the Past in Smartphone Investigations
From ACM TechNews

Retroscope Opens Doors to the Past in Smartphone Investigations

Researchers at Purdue University are developing a technique that could help law enforcement recover evidence from smartphones when investigating crimes.

Here's How Government Thinks Nanotech Will Transform Cyber
From ACM TechNews

Here's How Government Thinks Nanotech Will Transform Cyber

A group of U.S. federal organizations think brain-inspired nanotechnology could help the government protect its networks.

Google's Driverless-Car Czar on Taking the Human Out of the Equation
From ACM Opinion

Google's Driverless-Car Czar on Taking the Human Out of the Equation

You devoted your life to human-driven transportation, engineering SUVs at Ford and taking Hyundai (as U.S. CEO and president) to record levels of sales in the U...

How Vulnerable to Hacking Is the U.s. Election Cyber Infrastructure?
From ACM TechNews

How Vulnerable to Hacking Is the U.s. Election Cyber Infrastructure?

Adversaries' growing use of cyberweapons to influence target groups in the U.S. is provoking concern that the U.S. electoral process is at risk.

Hackers Hijack a Big Rig Truck's Accelerator and Brakes
From ACM News

Hackers Hijack a Big Rig Truck's Accelerator and Brakes

When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles' brakes or hijack their steering...

America's Electronic Voting Machines Are Scarily Easy Targets
From ACM News

America's Electronic Voting Machines Are Scarily Easy Targets

This week, GOP presidential candidate Donald Trump openly speculated that this election would be "rigged." Last month, Russia decided to take an active role in...

Snapping ­p Cheap Spy Tools, Nations 'monitoring Everyone'
From ACM News

Snapping ­p Cheap Spy Tools, Nations 'monitoring Everyone'

It was a national scandal. Peru's then-vice president accused two domestic intelligence agents of staking her out.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account