acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Forget Wearable Tech, Embeddable Implants Are Already Here
From ACM News

Forget Wearable Tech, Embeddable Implants Are Already Here

Smartphone mapping features are great for getting directions, until you lose signal.

Three Questions For Eugene Kaspersky
From ACM Opinion

Three Questions For Eugene Kaspersky

The Moscow-based computer security firm Kaspersky Lab has analyzed major new kinds of malware, including Stuxnet, which four years ago was revealed to have damaged...

Call of Cyber Duty: Military Academies Take on Nsa
From ACM Careers

Call of Cyber Duty: Military Academies Take on Nsa

If Douglas MacArthur or Ulysses S. Grant went to the U.S. Military Academy today, they might be testing their defensive skills hunched in front of a computer screen...

Supreme Court Weighing When Online Speech Becomes Illegal Threat
From ACM News

Supreme Court Weighing When Online Speech Becomes Illegal Threat

When does an online threat become worthy of criminal prosecution?

Meet Your Unborn Child—before It's Even Conceived
From ACM News

Meet Your Unborn Child—before It's Even Conceived

Will my baby be healthy?

The Bug that Rocked the Foundations of the Web
From ACM News

The Bug that Rocked the Foundations of the Web

Late on Monday afternoon, the details of one of the most serious security problems to ever affect the modern web were posted online.

Hackers Lurking in Vents and Soda Machines
From ACM News

Hackers Lurking in Vents and Soda Machines

They came in through the Chinese takeout menu.

5 Biometric Alternatives to the Password
From ACM News

5 Biometric Alternatives to the Password

There are many things that make you special: Your sense of humor, your dance moves, your personal style, the shape of your ear.

As Human Laws Grapple with Robots, There Are No Easy Answers
From ACM News

As Human Laws Grapple with Robots, There Are No Easy Answers

There's been a lot of buzz about robots lately.

A Veteran Programmer Explains How the Stock Market Became "Rigged"
From ACM Opinion

A Veteran Programmer Explains How the Stock Market Became "Rigged"

A small group of financial firms are using their technological superiority to skim the top off the market, Michael Lewis claims in his new book "Flash Boys."

Explore Angkor Wat with Google Street View
From ACM News

Explore Angkor Wat with Google Street View

Angkor, what remains of the capital of the Khmer Empire, is an incredibly beautiful place, but it's also very remote: tucked in the Cambodian jungle, at the intersection...

Wanna Build a Rocket? NASA's About to Give Away a Mountain of Its Code
From ACM TechNews

Wanna Build a Rocket? NASA's About to Give Away a Mountain of Its Code

NASA plans to publish a list of more than 1,000 software projects it has developed, with instructions on how users can acquire the associated software code for...

Cerf: Classified Nsa Work Mucked ­p Security For Early Tcp/ip
From ACM News

Cerf: Classified Nsa Work Mucked ­p Security For Early Tcp/ip

Internet pioneer Vint Cerf says that he had access to cutting edge cryptographic technology in the mid 1970s that could have made TCP/IP more secure – too bad the...

With California's Red Light Cameras, Are Pictures Admissible Evidence?
From ACM News

With California's Red Light Cameras, Are Pictures Admissible Evidence?

Carmen Goldsmith was driving her BMW through Inglewood, a Los Angeles suburb, when she ran a red light.

Physicists Are Building an Nsa-Proof Internet
From ACM News

Physicists Are Building an Nsa-Proof Internet

It's long been the Holy Grail of communications: technology that not only maximizes privacy, but also reveals when a message had been intercepted or copied.

Wanna Build a Rocket? Nasa's About to Give Away a Mountain of Its Code
From ACM News

Wanna Build a Rocket? Nasa's About to Give Away a Mountain of Its Code

Forty years after Apollo 11 landed on the moon, NASA open sourced the software code that ran the guidance systems on the lunar module.

Vint Cerf: CS Changes Needed To Address Iot Security, Privacy
From ACM Opinion

Vint Cerf: CS Changes Needed To Address Iot Security, Privacy

The Internet of Things has tremendous potential but also poses a tremendous risk if the underlying security of Internet of Things devices is not taken into account...

NSA Performed Warrantless Searches on Americans' Calls and Emails
From ACM TechNews

NSA Performed Warrantless Searches on Americans' Calls and Emails

The U.S. National Security Agency has performed warrantless searches of its databases to obtain data from Americans' phone calls and emails. 

While Warning of Chinese Cyberthreat, ­.s. Launches Its Own Attack
From ACM Opinion

While Warning of Chinese Cyberthreat, ­.s. Launches Its Own Attack

The U.S. government has long complained about Chinese hacking and cyberattacks, but new documents show that the National Security Agency managed to penetrate the...

Fact or Fiction?: Your Car Is Hackable
From ACM News

Fact or Fiction?: Your Car Is Hackable

When your home computer is hacked, the things at risk are your identity, finances and other digital assets.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account