acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Despite Pwn2own 2014 Hacks, Application Sandboxing Still Critical
From ACM TechNews

Despite Pwn2own 2014 Hacks, Application Sandboxing Still Critical

Participants and organizers of the recent CanSecWest security conference's Pwn2Own hacking contest say popular software is increasingly more secure. 

Are Smart Homes Intelligent Enough To Keep Out Hackers?
From ACM News

Are Smart Homes Intelligent Enough To Keep Out Hackers?

How hack-resistant are the connected systems in smart homes?

N.S.A. Breached Chinese Servers Seen as Security Threat
From ACM News

N.S.A. Breached Chinese Servers Seen as Security Threat

American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deals in the United States for...

Tor ­sage in Turkey Surges During Twitter Ban
From ACM News

Tor ­sage in Turkey Surges During Twitter Ban

Since Turkish Prime Minister Recep Tayyip Erdogan implemented a ban on Twitter late last week, Tor usage in the country has surged—with connections nearly doubling...

Revelations of N.s.a. Spying Cost ­.s. Tech Companies
From ACM News

Revelations of N.s.a. Spying Cost ­.s. Tech Companies

Microsoft has lost customers, including the government of Brazil.

Spinoffs from Spyland
From ACM News

Spinoffs from Spyland

It takes more than a little tradecraft to spin off a startup from the National Security Agency.

In Sickness and in Health: How Big Data Watches Over You
From ACM News

In Sickness and in Health: How Big Data Watches Over You

There are few places where you would less expect to find answers about the digital age than Iquitos, Peru.

Researchers Hope to Secure Development of Mobile Apps With Faster Code Scans
From ACM TechNews

Researchers Hope to Secure Development of Mobile Apps With Faster Code Scans

Fraunhofer Institute researchers are developing three new tools to evaluate or enhance the security of mobile apps. 

Facebook Creates Software That Matches Faces Almost as Well as You Do
From ACM News

Facebook Creates Software That Matches Faces Almost as Well as You Do

Asked whether two unfamiliar photos of faces show the same person, a human being will get it right 97.53 percent of the time.

Stanford Students Show That Phone Record Surveillance Can Yield Vast Amounts of Information
From ACM TechNews

Stanford Students Show That Phone Record Surveillance Can Yield Vast Amounts of Information

The U.S. National Security Agency's telephone metadata program can yield details of the familial, political, professional, religious, and sexual associations of...

Careers in Statistics Evolve and Expand
From ACM Careers

Careers in Statistics Evolve and Expand

Workers with statistics backgrounds have long been in healthy demand for academic, actuarial, pharmaceutical, or government jobs.

The Data Brokers: Selling Your Personal Information
From ACM Opinion

The Data Brokers: Selling Your Personal Information

Over the past six months or so, a huge amount of attention has been paid to government snooping, and the bulk collection and storage of vast amounts of raw data...

All Hacking Eyes on the Prize Money at Cansecwest
From ACM Careers

All Hacking Eyes on the Prize Money at Cansecwest

When it comes to hacking, it turns out that greed really is good.

Stanford Lab Yields New Privacy-Based Social Network
From ACM TechNews

Stanford Lab Yields New Privacy-Based Social Network

The new Omlet social network allows users complete control over their personal data. 

AI Researcher Says Amoral Robots Pose a Danger to Humanity
From ACM TechNews

AI Researcher Says Amoral Robots Pose a Danger to Humanity

Rensselaer Polytechnic Institute professor Selmer Bringsjord says understanding morality is increasingly important as robots become smarter and more autonomous. ...

Collecting Digital User Data Without Invading Privacy
From ACM TechNews

Collecting Digital User Data Without Invading Privacy

Privada is a new a cryptographic method that makes it possible to simultaneously collect data and protect the privacy of the user. 

Stanford Students Show Phone Record Surveillance Can Yield Vast Amounts of Information
From ACM News

Stanford Students Show Phone Record Surveillance Can Yield Vast Amounts of Information

The National Security Agency's mass surveillance of telephone metadata could yield detailed information about the private lives of individuals far beyond what the...

Gps Tech Built to Find Missing Aircraft Not Always Used
From ACM News

Gps Tech Built to Find Missing Aircraft Not Always Used

Aviation experts have cited multiple possible reasons for the problems in the multi-country effort to locate the Malaysia Airlines jetliner that dropped off the...

Cyberattacks Could Paralyze ­.s., Former Defense Chief Warns
From ACM TechNews

Cyberattacks Could Paralyze ­.s., Former Defense Chief Warns

Former U.S. Secretary of Defense Leon Panetta said a large-scale cyberattack against U.S. infrastructure is "the most serious threat in the 21st century." 

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers
From ACM News

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers

The tense on-the-ground standoff in Ukraine has already tipped into open hostilities online, with hackers targeting members of parliament and state agencies.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account