acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Trigger Finger: Apple Fires Biometrics Into the Mainstream
From ACM Opinion

Trigger Finger: Apple Fires Biometrics Into the Mainstream

By adding a fingerprint scanner to its newest mobile phone, Apple Inc. is offering a tantalizing glimpse of a future where your favorite gadget might become a biometric...

The Real Reasons Apple's 64-Bit A7 Chip Makes Sense
From ACM Opinion

The Real Reasons Apple's 64-Bit A7 Chip Makes Sense

Apple injected a lot of marketing hyperbole into its claims about the wonders of 64-bit computing when it showed off the A7 processor at the heart of the new ...

Tackling Enterprise Threats From the Internet of Things
From ACM TechNews

Tackling Enterprise Threats From the Internet of Things

Security experts warn that a dire threat is posed by the poor security of the Internet of Things.

Readying Iris Recognition For Prime Time
From ACM TechNews

Readying Iris Recognition For Prime Time

A U.S. National Institute of Standards and Technology team says iris scans remain highly reliable over time. 

Fingerprints As Passwords: New Iphone Touch Id Gets Mixed Security Verdict
From ACM News

Fingerprints As Passwords: New Iphone Touch Id Gets Mixed Security Verdict

Of all the new features of Apple's new iPhone 5S, few have drawn more attention than the built-in fingerprint scanner known as Touch ID.

The Nsa Sponsors 'cyber Operations' Training at ­niversities. Here's What Students Learn.
From ACM News

The Nsa Sponsors 'cyber Operations' Training at ­niversities. Here's What Students Learn.

Last week, Carnegie Mellon University in Pittsburgh became one of the latest—and most prestigious—schools to partner with the National Security Agency on a program...

Mapping the Bitcoin Economy Could Reveal Users' Identities
From ACM TechNews

Mapping the Bitcoin Economy Could Reveal Users' Identities

An analysis of the public log of Bitcoin digital currency transactions could enable law enforcement to pinpoint user identities. 

Imagining a Cyberattack on the Power Grid
From ACM Opinion

Imagining a Cyberattack on the Power Grid

It's electrifying.

iSpy: How the NSA Accesses Smartphone Data
From ACM News

iSpy: How the NSA Accesses Smartphone Data

Michael Hayden has an interesting story to tell about the iPhone.

Sudoku Saves Photographers From Copyright Theft
From ACM TechNews

Sudoku Saves Photographers From Copyright Theft

Computer scientists in Malaysia have developed a watermarking technology based on a system similar to the rules used to solve the puzzles known as Sudoku. 

Beyond Passwords: New Tools to Identify Humans
From ACM News

Beyond Passwords: New Tools to Identify Humans

As everything around us becomes connected to the Internet, from cars to thermometers to the stuff inside our mobile phones, technologists are confronting a tough...

Nsa Surveillance Makes For Strange Bedfellows
From ACM Opinion

Nsa Surveillance Makes For Strange Bedfellows

The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...

How the N.S.A Cracked the Web
From ACM News

How the N.S.A Cracked the Web

It's been nearly three months since Edward Snowden started telling the world about the National Security Agency's mass surveillance of global communications.

Huge Botnet Found ­sing Tor Network For Communications
From ACM News

Huge Botnet Found ­sing Tor Network For Communications

In the wake of the revelations surrounding the NSA's domestic surveillance and intelligence-gathering operations, security experts said there would likely be a...

Nsa Able to Foil Basic Safeguards of Privacy on Web
From ACM TechNews

Nsa Able to Foil Basic Safeguards of Privacy on Web

The National Security Agency uses a variety of means to overcome encryption technologies, such as supercomputers, technical strategies, court orders, and persuasion...

Internet Needs 'cyber Fire Department' to Protect Web Users, Claims Vint Cerf
From ACM TechNews

Internet Needs 'cyber Fire Department' to Protect Web Users, Claims Vint Cerf

The Internet needs a cyber fire department to keep risks found on websites and services from spreading, says Google chief Internet evangelist and ACM president...

Scientists Expand Scale of Digital Snooping Alert
From ACM TechNews

Scientists Expand Scale of Digital Snooping Alert

Researchers at Toshiba's European research laboratory in Cambridge, England, have released a paper describing a way to enable a group of users to exchange encryption...

Privacy App Pinpoints Your Exact Location Using Social Media
From ACM TechNews

Privacy App Pinpoints Your Exact Location Using Social Media

Many people are unaware that metadata accompanying social media posts can be used to "cybercase" their homes. 

Windows 8 Picture Passwords Easily Cracked
From ACM TechNews

Windows 8 Picture Passwords Easily Cracked

Security researchers have found taht Microsoft Windows 8's picture gesture authentication system is not difficult to crack.

Tech Pioneer Vint Cerf on the Age of Context and Why You Can't Be a Citizen of the Internet
From ACM Opinion

Tech Pioneer Vint Cerf on the Age of Context and Why You Can't Be a Citizen of the Internet

Few people have as much claim as Vint Cerf to the title "Father of the Internet," but as the technologies he helped develop in the 1970s and 1980s become increasingly...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account