acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


General Agreement
From Communications of the ACM

General Agreement

Leslie Lamport contributed to the theory and practice of building distributed computing systems that work as intended.

Secrets, Lies and Snowden's Email: Why I Was Forced to Shut Down Lavabit
From ACM Opinion

Secrets, Lies and Snowden's Email: Why I Was Forced to Shut Down Lavabit

My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation...

Neuromorphic Computing Gets Ready For the (Really) Big Time
From Communications of the ACM

Neuromorphic Computing Gets Ready For the (Really) Big Time

A technology inspired by biological principles but 'steamrolled for decades' prepares to take off as Moore's Law approaches its long-anticipated end.

Wireless Camera Network Offers New Possibilities For Security Systems
From ACM TechNews

Wireless Camera Network Offers New Possibilities For Security Systems

The Solar Wi-Fi Energy Efficient Tracking camera system is a prototype device for a solar-powered wireless network of smart cameras. 

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?
From ACM Opinion

Should ­.s. Hackers Fix Cybersecurity Holes or Exploit Them?

There's a debate going on about whether the U.S. government—specifically, the NSA and United States Cyber Command—should stockpile Internet vulnerabilities or disclose...

Researchers Discover Critical Flaws in the Chip and Pin System
From ACM TechNews

Researchers Discover Critical Flaws in the Chip and Pin System

A pair of critical flaws in EMV smart card technology can be exploited to generate cloned cards that are undetectable by normal bank procedures. 

The Myths & Realities of How the Eu's New 'right To Be Forgotten' in Google Works
From ACM Opinion

The Myths & Realities of How the Eu's New 'right To Be Forgotten' in Google Works

Is it true that anyone in the EU can have anything removed from Google and other search engines?

For U.s. Companies That Challenge China, the Risk of Digital Reprisal
From ACM News

For U.s. Companies That Challenge China, the Risk of Digital Reprisal

Two large American steel makers, U.S. Steel and Allegheny Technologies, each lost confidential files giving access to their computer networks.

Fighting Off Virtual Attacks
From ACM TechNews

Fighting Off Virtual Attacks

Researchers say they have taken ideas from nature and applied them to security for software that runs on digital devices. 

New Algorithm Shakes ­p Cryptography
From ACM TechNews

New Algorithm Shakes ­p Cryptography

Researchers have uncovered a flaw in cryptography security, discrediting several cryptographic systems that were assumed to provide sufficient safeguards. 

"we're at Greater Risk": General Keith Alexander
From ACM Opinion

"we're at Greater Risk": General Keith Alexander

Since Edward Snowden's revelations about government surveillence, we know more about how the National Security Agency has been interpreting Section 215 of the Patriot...

Who Watches the Watchers? Big Data Goes ­nchecked
From ACM Opinion

Who Watches the Watchers? Big Data Goes ­nchecked

The National Security Agency might be tracking your phone calls. But private industry is prying far more deeply into your life.

More Google 'forget' Requests Emerge After Eu Ruling
From ACM News

More Google 'forget' Requests Emerge After Eu Ruling

A man who tried to kill his family is among the latest to request removal of search results from Google.

Computers See Your Face as a Child. Will They Recognize You as an Adult?
From ACM TechNews

Computers See Your Face as a Child. Will They Recognize You as an Adult?

Questions have emerged about whether facial recognition technology could recognize an adult based on images of that person as a child. 

Do We Need Asimov's Laws?
From ACM News

Do We Need Asimov's Laws?

In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...

After European Court Decision, Google Works on a Link Removal Tool
From ACM News

After European Court Decision, Google Works on a Link Removal Tool

Google will announce by the end of the month a mechanism for consumers to request that links to information about them be removed from the company’s search engine...

Facebook Experiment Helps Battle Man-in-the-Middle Attacks
From ACM TechNews

Facebook Experiment Helps Battle Man-in-the-Middle Attacks

Researchers at Facebook and Carnegie Mellon University have adapted a detection tool for man-in-the-middle attacks for Facebook. 

Some Predictions About the Internet of Things and Wearable Tech From Pew Research
From ACM News

Some Predictions About the Internet of Things and Wearable Tech From Pew Research

Remember the prediction that one day your oven would be connected to the Internet and have the ability to talk to your car?

Estonian Electronic Voting System Vulnerable to Attacks, Researchers Say
From ACM TechNews

Estonian Electronic Voting System Vulnerable to Attacks, Researchers Say

Estonia's electronic voting system cannot guarantee fair elections because of fundamental security weaknesses and poor operations procedures.

It's Judgment Day For Killer Robots at the ­nited Nations
From ACM TechNews

It's Judgment Day For Killer Robots at the ­nited Nations

The United Nations on Tuesday began its first-ever multinational convention on "lethal autonomous weapons systems." 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account