acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


You'll Never Believe the Data 'wiped' Smartphones Store
From ACM Opinion

You'll Never Believe the Data 'wiped' Smartphones Store

Few things are more precious, intimate, and personal than the data on your smartphone.

Bitcoin May Be the Global Economy's Last Safe Haven
From ACM News

Bitcoin May Be the Global Economy's Last Safe Haven

One of the oddest bits of news to emerge from the economic collapse of Cyprus is a corresponding rise in the value of Bitcoin, the Internet’s favorite, media-friendly...

Little-Known Surveillance Tool Raises Concerns By Judges, Privacy Activists
From ACM News

Little-Known Surveillance Tool Raises Concerns By Judges, Privacy Activists

Federal investigators in Northern California routinely used a sophisticated surveillance system to scoop up data from cellphones and other wireless devices in an...

Cyberattacks Seem Meant to Destroy, Not Just Disrupt
From ACM TechNews

Cyberattacks Seem Meant to Destroy, Not Just Disrupt

The criminals behind recent cyberattacks on U.S. financial companies seem intent on destroying their targets, instead of simply disrupting business operations. 

The Mayor's Geek Squad
From ACM News

The Mayor's Geek Squad

It was a case for a digital Sherlock Holmes.

Yes, Your New Car Has A 'black Box.' Where's The Off Switch?
From ACM News

Yes, Your New Car Has A 'black Box.' Where's The Off Switch?

If you're a vehicle owner and happen to have a car accident in the near future (we hope you don't), it's likely the crash details will be recorded.

Web Money Gets Laundering Rule
From ACM News

Web Money Gets Laundering Rule

The U.S. is applying money-laundering rules to "virtual currencies," amid growing concern that new forms of cash bought on the Internet are being used to fund illicit...

Copyright Ruling Rings With Echo of Betamax
From ACM News

Copyright Ruling Rings With Echo of Betamax

Before Napster and LimeWire, before Megauploads and the Pirate Bay, media companies' epic struggle against copying, piracy and generally losing control over their...

Luring Young Web Warriors Is a ­.S. Priority. It’s Also a Game.
From ACM TechNews

Luring Young Web Warriors Is a ­.S. Priority. It’s Also a Game.

U.S. Department of Homeland Security secretary Janet Napolitano says her department is in dire need of computer hackers. 

Employers Struggle to Fill Computer Security Jobs
From ACM News

Employers Struggle to Fill Computer Security Jobs

Corporations and government agencies are scrambling to find new ways to attract people to jobs in information security, thanks to a growing gap between the demand...

Ap Wins Big: Why a Court Said Clipping Content Is Not Fair ­se
From ACM News

Ap Wins Big: Why a Court Said Clipping Content Is Not Fair ­se

A federal court has sided with the Associated Press and the New York Times in a closely watched case involving a company that scraped news content from the Internet...

It's Like They’re Reading My Mind
From ACM News

It's Like They’re Reading My Mind

Whether it's our location, contact lists, calendars, photo albums, or search requests, app developers, advertising companies, and other tech firms are scrambling...

Carnegie Mellon, Nsa Seek High School Hackers
From ACM Careers

Carnegie Mellon, Nsa Seek High School Hackers

Bored with classes? Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking.

Hong Kong Looks to Build ­nderground Datacentre Caves
From ACM News

Hong Kong Looks to Build ­nderground Datacentre Caves

With more than seven million people squeezed in to around 1,100sq km of land space, and property prices regularly ranking among the highest in the world, Hong Kong...

U.s. Cybersecurity Policy Draws Interest from Companies, Lobbyists
From ACM News

U.s. Cybersecurity Policy Draws Interest from Companies, Lobbyists

The determination by Congress and President Obama to protect networks of critical U.S. industries from hackers and cyberspies is creating an explosive growth opportunity—for...

Artificial Connections
From Communications of the ACM

Artificial Connections

Scientists at the Blue Brain Project are using supercomputers to simulate neural connections in a 3-D model of a slice of mammalian brain.

Inexact Design
From Communications of the ACM

Inexact Design: Beyond Fault-Tolerance

In a new approach to making computers more efficient, called "inexact," "probabilistic," or "approximate" computing, errors are not avoided; they are welcomed....

Bitcoin: Fastest Growing Currency in the World
From ACM News

Bitcoin: Fastest Growing Currency in the World

Bitcoin is an unregulated, uncontrolled online currency—worth more than £500m, it's the world's fastest growing.

Hackers Can Be Battlefield Targets, Says Nato Report
From ACM TechNews

Hackers Can Be Battlefield Targets, Says Nato Report

NATO's cyberwarfare handbook says that civilian hackers who carry out cyberattacks during coordinated military campaigns can be targeted as combatants. 

Domestic Drones Stir Imaginations, and Concerns
From ACM News

Domestic Drones Stir Imaginations, and Concerns

On the pilot's computer screen, planted at ground level a few yards from the airport runway here, the data streaming across the display tracked an airplane at 1...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account