acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


'internet of Things,' Not Privacy, to Dominate at Black Hat
From ACM News

'internet of Things,' Not Privacy, to Dominate at Black Hat

As many as 13 previously unknown vulnerabilities in home Wi-Fi routers and networked storage systems are set to be disclosed at the Black Hat computer security...

Arrogance Is Good: In Defense of Silicon Valley
From ACM Careers

Arrogance Is Good: In Defense of Silicon Valley

Sam Altman sits behind his desk with his knees pulled up to his chest, eating dried apricots.

Watch This Wireless Hack Pop a Car's Locks in Minutes
From ACM News

Watch This Wireless Hack Pop a Car's Locks in Minutes

Shims and coat hangers are the clumsy tools of last century's car burglars.

Hacker Says to Show Passenger Jets at Risk of Cyber Attack
From ACM News

Hacker Says to Show Passenger Jets at Risk of Cyber Attack

Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight...

Can Google Build a Typeface to Support Every Written Language?
From ACM News

Can Google Build a Typeface to Support Every Written Language?

Google has taken on its fair share of ambitious projects—digitizing millions and millions of books, mapping the whole world, pioneering self-driving cars.

How Google Scans Your Gmail For Child Porn
From ACM News

How Google Scans Your Gmail For Child Porn

John Henry Skillern was arrested last Thursday for the possession of child pornography.

Twitter Bots Grow ­p and Take On the World
From ACM News

Twitter Bots Grow ­p and Take On the World

On 18 July, someone in the Russian government edited Wikipedia.

Big Data Firm Says It Can Link Snowden Data to Changed Terrorist Behavior
From ACM News

Big Data Firm Says It Can Link Snowden Data to Changed Terrorist Behavior

For nearly a year, U.S. government officials have said revelations from former NSA contract worker Edward Snowden harmed national security and allowed terrorists...

The Nsa's Cyber-King Goes Corporate
From ACM Opinion

The Nsa's Cyber-King Goes Corporate

Keith Alexander, the recently retired director of the National Security Agency, left many in Washington slack-jawed when it was reported that he might charge companies...

The Weird Reasons Why People Make ­p False Identities on the Internet
From ACM Opinion

The Weird Reasons Why People Make ­p False Identities on the Internet

Sockpuppetry—using false identities for deception—is centuries old, but the advent of the web has made creating sockpuppets, and falling for their tricks, easier...

How Spy Agencies Keep Their 'toys' from Law Enforcement
From ACM News

How Spy Agencies Keep Their 'toys' from Law Enforcement

A little over a decade ago, federal prosecutors used keystroke logging software to steal the encryption password of an alleged New Jersey mobster, Nicodemo Scarfo...

The Remarkable Story of the ­nderwater Internet
From ACM News

The Remarkable Story of the ­nderwater Internet

In October of 1971, in the midst of the Cold War, the nuclear-powered submarine USS Halibut entered heavily guarded Russian waters in the Sea of Okhotsk.

Meet the Online Tracking Device That Is Virtually Impossible to Block
From ACM News

Meet the Online Tracking Device That Is Virtually Impossible to Block

A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.com.

Russia Offers $110,000 to Crack Tor Anonymous Network
From ACM News

Russia Offers $110,000 to Crack Tor Anonymous Network

Russia has offered 3.9m roubles ($110,000; £65,000) in a contest seeking a way to crack the identities of users of the Tor network.

Behind the Smoking Guns: Inside Nypd's 21st Century Arsenal
From ACM News

Behind the Smoking Guns: Inside Nypd's 21st Century Arsenal

In the early morning hours of last Sept. 25, a stocky young man bolted the Bora Bora Lounge in Highbridge, the Bronx, with a gun in his hand and squeezed off seven...

How to Invent a Person Online
From ACM Opinion

How to Invent a Person Online

On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio.

Google's New Moonshot Project: The Human Body
From ACM News

Google's New Moonshot Project: The Human Body

Google Inc. has embarked on what may be its most ambitious and difficult science project ever: a quest inside the human body.

U.s. Government Chatbot Gets You to Tell All
From ACM News

U.s. Government Chatbot Gets You to Tell All

Want access to the U.S. government's secrets? Talk to the robot.

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud
From ACM News

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud

Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing...

Hello, My Name Is . . .
From Communications of the ACM

Hello, My Name Is . . .

Facial recognition and privacy concerns.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account