acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Warrantless Phone Tapping, Email Spying Inching to Supreme Court Review
From ACM News

Warrantless Phone Tapping, Email Spying Inching to Supreme Court Review

In 2013, the Supreme Court rejected a challenge to a once-clandestine warrantless surveillance program that gobbles up Americans' electronic communications—a project...

When a Company Is Put ­p For Sale, in Many Cases, Your Personal Data Is, Too
From ACM News

When a Company Is Put ­p For Sale, in Many Cases, Your Personal Data Is, Too

The privacy policy for Hulu, a video-streaming service with about nine million subscribers, opens with a declaration that the company "respects your privacy."

A Computer's Heat Could Divulge Top Secrets
From ACM News

A Computer's Heat Could Divulge Top Secrets

The most secure computers in the world can't "Google" a thing—they are disconnected from the Internet and all other networks.

Automakers Tackle the Massive Security Challenges of Connected Vehicles
From ACM News

Automakers Tackle the Massive Security Challenges of Connected Vehicles

The National Highway Traffic Safety Administration is accelerating its efforts to mandate vehicle-to-vehicle communications, a step that could help lower the number...

The Secret Codes of British Banknotes
From ACM News

The Secret Codes of British Banknotes

A brand-new Xerox colour photocopier had just arrived at one of Cambridge's industrial labs.

Should a Driverless Car Decide Who Lives or Dies?
From ACM News

Should a Driverless Car Decide Who Lives or Dies?

The gearheads in Detroit, Tokyo, and Stuttgart have mostly figured out how to build driverless vehicles. Even the Google guys seem to have solved the riddle.

The New Smart Cities
From Communications of the ACM

The New Smart Cities

How urban information systems are slowly revamping the modern metropolis.

ACM Announces 2014 Award Recipients
From Communications of the ACM

ACM Announces 2014 Award Recipients

Recognizing excellence in technical and professional achievements and contributions in computer science and information technology.

What Is the Big Secret Surrounding Stingray Surveillance?
From ACM Opinion

What Is the Big Secret Surrounding Stingray Surveillance?

Given the amount of mobile phone traffic that cell phone towers transmit, it is no wonder law enforcement agencies target these devices as a rich source of data...

How the ­.s. Finally Tracked Down a Hacker Kingpin
From ACM News

How the ­.s. Finally Tracked Down a Hacker Kingpin

For the U.S., the extradition of Ercan Findikoglu shows the value of patience when it comes to pursuing suspected hacker kingpins.

Building the Face of a Criminal from Dna
From ACM News

Building the Face of a Criminal from Dna

The face of a killer constructed from DNA left at the scene of a crime: it sounds like science fiction. But revealing the face of a criminal based on their genes...

Facebook Can Recognise You in Photos Even If You're Not Looking
From ACM News

Facebook Can Recognise You in Photos Even If You're Not Looking

Thanks to the latest advances in computer vision, we now have machines that can pick you out of a line-up. But what if your face is hidden from view?

'epic' Fail—how Opm Hackers Tapped the Mother Lode of Espionage Data
From ACM News

'epic' Fail—how Opm Hackers Tapped the Mother Lode of Espionage Data

Government officials have been vague in their testimony about the data breaches—there was apparently more than one—at the Office of Personnel Management.

A Disaster Foretold — and Ignored
From ACM News

A Disaster Foretold — and Ignored

LOpht's warnings about the Internet drew notice, but little action.

Facebook's New AI Can Paint, But Google's Knows How to Party
From ACM News

Facebook's New AI Can Paint, But Google's Knows How to Party

Facebook and Google are building enormous neural networks—artificial brains—that can instantly recognize faces, cars, buildings, and other objects in digital photos...

How Encryption Keys Could Be Stolen By Your Lunch
From ACM TechNews

How Encryption Keys Could Be Stolen By Your Lunch

Researchers from Tel Aviv University have developed an easily concealable device that can deduce encryption keys by sniffing the electromagnetic leakage from a...

Face Recognition Row Over Right to Identify You in the Street
From ACM News

Face Recognition Row Over Right to Identify You in the Street

"If you are walking down the street, a public street, should a company be able to identify you without your permission?"

The State of Encryption Tools, 2 Years After Snowden Leaks
From ACM News

The State of Encryption Tools, 2 Years After Snowden Leaks


Ancient American Genome Rekindles Legal Row
From ACM News

Ancient American Genome Rekindles Legal Row

The genome of a famous 8,500-year-old North American skeleton, known as Kennewick Man, shows that he is closely related to Native American tribes that have for...

Beware the Listening Machines
From ACM Opinion

Beware the Listening Machines

One of my great pleasures in life is attending conferences on fields I'm intrigued by, but know nothing about.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account