acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Quantum Invisibility Cloak Hides Objects from Reality
From ACM News

Quantum Invisibility Cloak Hides Objects from Reality

Invisibility cloaks are all the rage these days.

The Nsa Could Collect Far More Than Your Phone Records from Mobile Operators
From ACM News

The Nsa Could Collect Far More Than Your Phone Records from Mobile Operators

The revelation that the National Security Agency is collecting our phone records has generated considerable outrage, but phone call metadata is just the beginning...

Big Data Sleuthing, 1960s Style
From ACM News

Big Data Sleuthing, 1960s Style

America's intelligence agencies have long prodded the frontiers of computing and data analysis as the most demanding of customers, willing to pay whatever it takes...

Securing the Cloud
From ACM TechNews

Securing the Cloud

Researchers have created an encryption algorithm that could improve security for cloud computing technology. 

Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
From ACM TechNews

Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not

Quantum cryptography can theoretically encrypt a message in a way that can't be hacked, but even quantum cryptography systems can fail. 

Spies Like ­s: How We All Helped Build Prism
From ACM Careers

Spies Like ­s: How We All Helped Build Prism

It used to be that the National Security Agency and its ilk had to pay through the nose for the latest in spying technology.

From ACM News

How Google Transfers Data to Nsa

How does Google hand over data to the government? By old-fashioned secure "file transfer protocol," or FTP. And sometimes even by hand.

How the ­.s. ­ses Technology to Mine More Data More Quickly
From ACM News

How the ­.s. ­ses Technology to Mine More Data More Quickly

When American analysts hunting terrorists sought new ways to comb through the troves of phone records, e-mails, and other data piling up as digital communications...

What Would Happen If All Satellites Stopped Working?
From ACM Opinion

What Would Happen If All Satellites Stopped Working?

We may not always realise it, but we depend on space technology orbiting the Earth.

Google Facial Password Patent Aims to Boost Android Security
From ACM TechNews

Google Facial Password Patent Aims to Boost Android Security

A recent Google patent application suggests users stick out their tongue in place of a password, to keep the Face Unlock facility from being fooled by photos.

Drone Nation: A New Industry Takes Flight
From ACM Careers

Drone Nation: A New Industry Takes Flight

By 2025 the drone industry will employ 100,000 people and be worth $82 billion globally, according to the Association for Unmanned Vehicle Systems International...

Opening the Doors of Deception
From ACM News

Opening the Doors of Deception

IT managers may incorporate a variety of deceptive tactics into their protective strategies to fend off hackers.

From ACM News

Administration Says Mining of Data Is Crucial to Fight Terror

In early September 2009, an e-mail passed through an Internet address in Peshawar, Pakistan, that was being monitored by the vast computers controlled by American...

From ACM News

People's Locations Could Be Tracked

Data collected by the National Security Agency's program that monitors Americans' phone calls could be used to track millions of people's locations through their...

Hacking the Drone War's Secret History
From ACM News

Hacking the Drone War's Secret History

In 2008 U.S. troops in Iraq discovered that Shi’ite insurgents had figured out how to tap and record video feeds from overhead American drones. Now you too can...

If Our Gadgets Could Measure Our Emotions
From ACM News

If Our Gadgets Could Measure Our Emotions

On a recent family outing, my mother and sister got into a shouting match. But they weren’t mad at each other—they were yelling at the iPhone’s turn-by-turn navigation...

'Temporal Cloaking' Could Bring More Secure Optical Communications
From ACM TechNews

'Temporal Cloaking' Could Bring More Secure Optical Communications

A new method for the "temporal cloaking" of optical communications could improve security for telecommunications. 

Contact Lens Computer: Like Google Glass, Without the Glasses
From ACM News

Contact Lens Computer: Like Google Glass, Without the Glasses

For those who find Google Glass indiscreet, electronic contact lenses that outfit the user’s cornea with a display may one day provide an alternative.

President Obama: 'right Balance' on Surveillance
From ACM News

President Obama: 'right Balance' on Surveillance

President Barack Obama defended his administration’s data-gathering programs Friday, calling them necessary for national security and well within the bounds of...

China Is Victim of Hacking Attacks
From ACM News

China Is Victim of Hacking Attacks

China has been the target of serious cyberattacks from the United States, but Beijing has never blamed Washington or the Pentagon because such accusations would...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account