acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Smartphone Secrets May Be Better Than a Password
From ACM News

Smartphone Secrets May Be Better Than a Password

Before you read this story, try to answer the following question: Who was the first person to text you today?

Researchers Plan to Demonstrate a Wireless Car Hack This Summer
From ACM News

Researchers Plan to Demonstrate a Wireless Car Hack This Summer

A note of caution to anyone who works on the security team of a major automobile manufacturer: Don't plan your summer vacation just yet.

Security Experts Hack Teleoperated Surgical Robot
From ACM TechNews

Security Experts Hack Teleoperated Surgical Robot

University of Washington in Seattle researchers are studying the issues associated with the communications technology involved in telesurgery. 

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia
From ACM News

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia

Somewhere near Iceland, a new NATO member, Berlya is under cyber-attack, most likely launched from its arch-rival Crimsonia, although the Berlyans can’t be completely...

Biometrics May Ditch the Password, But Not the Hackers
From ACM News

Biometrics May Ditch the Password, But Not the Hackers

Passwords get hacked—a lot.

Cloud Security Reaches Silicon
From ACM TechNews

Cloud Security Reaches Silicon

Researchers are working to implement a way to thwart criminals from inferring computer data based on the pattern in which the machine accesses its memory.

Pentagon Announces New Strategy For Cyberwarfare
From ACM TechNews

Pentagon Announces New Strategy For Cyberwarfare

U.S. Department of Defense Secretary Ashton B. Carter has outlined the circumstances under which the U.S. could use cyberweapons against attackers. 

Should Law Enforcement Have the Ability to Access Encrypted Communications?
From ACM Opinion

Should Law Enforcement Have the Ability to Access Encrypted Communications?

People's distress over the privacy of their communications has never been more acute. Whether the fear is over U.S. surveillance or breaches by hackers of unknown...

Is 'Good Enough' Computing Good Enough?
From Communications of the ACM

Is 'Good Enough' Computing Good Enough?

The energy-accuracy trade-off in approximate computing.

Putting the Data Science Into Journalism
From Communications of the ACM

Putting the Data Science Into Journalism

News organizations increasingly use techniques like data mining, Web scraping, and data visualization to uncover information that would be impossible to identify...

Bug Bounties Fail to Find Many Software Flaws, Researchers Say
From ACM TechNews

Bug Bounties Fail to Find Many Software Flaws, Researchers Say

Researchers say paying rewards to vulnerability researchers to locate flaws in software initially works, but mature software requires a different strategy. 

White House and Department of Homeland Security Want a Way Around Encryption
From ACM News

White House and Department of Homeland Security Want a Way Around Encryption

The White House and U.S. Department of Homeland Security officials support arguments by the nation’s law enforcement and intelligence leaders that encryption technology...

Security Professionals Stymied By Outdated Visualization Tools
From ACM Careers

Security Professionals Stymied By Outdated Visualization Tools

Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down...

How Benford's Law Reveals Suspicious Activity on Twitter
From ACM News

How Benford's Law Reveals Suspicious Activity on Twitter

Back in the 1880s, the American astronomer Simon Newcomb noticed something strange about the book of logarithmic tables in his library—the earlier pages were much...

Smart City Technology May Be Vulnerable to Hackers
From ACM TechNews

Smart City Technology May Be Vulnerable to Hackers

Cesar Cerrudo, chief technology officer at IOActive Labs, says "smart city" technologies are vulnerable to cyberattacks. 

Hackers ­sing Startling New Ways to Steal Your Passwords
From ACM TechNews

Hackers ­sing Startling New Ways to Steal Your Passwords

Rsearchers have found hackers can speculate PINs by interpreting video of people tapping their smartphone screens even when the display is not visible. 

3 Questions on Killer Robots
From ACM Opinion

3 Questions on Killer Robots

Delegates to the United Nations Convention on Certain Conventional Weapons are meeting this week in Geneva to discuss fully autonomous weapons—machines that could...

Fighting the Next Generation of Cyberattacks
From ACM TechNews

Fighting the Next Generation of Cyberattacks

Researchers recently received a $3-million U.S. Defense Advanced Research Projects Agency grant to develop software that can identify a new kind of vulnerability...

Car Safety System Could Anticipate Driver's Mistakes
From ACM TechNews

Car Safety System Could Anticipate Driver's Mistakes

Cornell University researchers have developed an algorithm-based automotive system to predict if the driver will turn, change lanes, or continue going straight. ...

As Encryption Spreads, U.s. Grapples with Clash Between Privacy, Security
From ACM News

As Encryption Spreads, U.s. Grapples with Clash Between Privacy, Security

For months, federal law enforcement agencies and industry have been deadlocked on a highly contentious issue: Should tech companies be obliged to guarantee government...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account