acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Extreme Cryptography Paves Way to Personalized Medicine
From ACM News

Extreme Cryptography Paves Way to Personalized Medicine

The dream for tomorrow's medicine is to understand the links between DNA and disease—and to tailor therapies accordingly.

Better Debugger
From ACM TechNews

Better Debugger

Researchers last week unveiled a new algorithm for identifying integer-overflow bugs. 

How Crashing Drones Are Exposing Secrets About ­.s. War Operations
From ACM News

How Crashing Drones Are Exposing Secrets About ­.s. War Operations

Crashing drones are spilling secrets about U.S. military operations.

Voice Control Will Force an Overhaul of the Whole Internet
From ACM News

Voice Control Will Force an Overhaul of the Whole Internet

Jason Mars built his own Siri and then he gave it away.

New Approach ­ses 'twisted Light' to Increase the Efficiency of Quantum Cryptography Systems
From ACM TechNews

New Approach ­ses 'twisted Light' to Increase the Efficiency of Quantum Cryptography Systems

University of Rochester researchers have developed a way to transfer 2.05 bits per photon by using "twisted light."

Polymorphic Security Warnings More Effective Than Same, Static Ones
From ACM TechNews

Polymorphic Security Warnings More Effective Than Same, Static Ones

Polymorphic security warnings help reduce habituation in the brain, making computer users more likely to pay attention and not dismiss them outright.

Deanonymizing Tor ­sers With Raptor Attacks
From ACM TechNews

Deanonymizing Tor ­sers With Raptor Attacks

Researchers have demonstrated the effectiveness of a suite of traffic analysis attacks that deanonymize Tor users. 

Stealing Data from Computers ­sing Heat
From ACM News

Stealing Data from Computers ­sing Heat

Air-gapped systems, which are isolated from the Internet and are not connected to other systems that are connected to the Internet, are used in situations that...

What's the Price Now?
From Communications of the ACM

What's the Price Now?

Dynamic pricing finds its way into a growing number of industries.

Secure-System Designers Strive to STEM Data Leaks
From Communications of the ACM

Secure-System Designers Strive to STEM Data Leaks

Attackers using side-channel analysis require little knowledge of how an implementation operates.

How the Dark Web Spurs a Spying 'arms Race'
From ACM News

How the Dark Web Spurs a Spying 'arms Race'

It's a technological arms race, pure and simple.

What Your Tweets Say About You
From ACM News

What Your Tweets Say About You

How much can your tweets reveal about you? Judging by the last nine hundred and seventy-two words that I used on Twitter, I'm about average when it comes to feeling...

­.s. Must Step ­p Capacity For Cyberattacks, Chief Argues
From ACM TechNews

­.s. Must Step ­p Capacity For Cyberattacks, Chief Argues

The director of the U.S. National Security Agency and the U.S. Cyber Command  advocated development of cyberweapons as a means of deterring cyberattacks.

Edward Snowden Would Like to Explain Himself to a Jury, but He Can't
From ACM News

Edward Snowden Would Like to Explain Himself to a Jury, but He Can't

Edward Snowden wants to come home.

Computer-Stored Encryption Keys Are Not Safe From Side-Channel Attacks
From ACM TechNews

Computer-Stored Encryption Keys Are Not Safe From Side-Channel Attacks

Tel Aviv University researchers have found a way to ex-filtrate complex encryption data using side-channel technology. 

Researchers Find Same Rsa Encryption Key ­sed 28,000 Times
From ACM TechNews

Researchers Find Same Rsa Encryption Key ­sed 28,000 Times

Researchers at Royal Holloway, University of London have found that several million Internet hosts are still vulnerable to the FREAK flaw in the SSL/TLS encryption...

New Keys to Data Security
From ACM News

New Keys to Data Security

An intelligent keyboard can tell who you are, and power itself from your typing.

Linux Adopts Conflict Resolution Code
From ACM TechNews

Linux Adopts Conflict Resolution Code

To reduce conflicts within the Linux development community, the group has adopted a new code of conduct that comes in the form of a Linux patch. 

Google's Eric Schmidt Downplays Fears Over Artificial Intelligence
From ACM News

Google's Eric Schmidt Downplays Fears Over Artificial Intelligence

Arguably the most alarming part of concerns over artificial intelligence's potential to end human civilization is the voices that are speaking out.

A Police Gadget Tracks Phones? Shhh! It's Secret
From ACM News

A Police Gadget Tracks Phones? Shhh! It's Secret

A powerful new surveillance tool being adopted by police departments across the country comes with an unusual requirement: To buy it, law enforcement officials...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account