acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Just Tap Here: Technology and Travel
From ACM News

Just Tap Here: Technology and Travel

Goodbye, plastic hotel room key. So long, wallet. Farewell, camera.

5 Things You Need to Know About NSA Phone Tracking
From ACM News

5 Things You Need to Know About NSA Phone Tracking

The revelation that the Obama administration is pursuing a massive surveillance program that tracks countless U.S. and international phone calls has brought privacy...

A Day in the Life of the Relentlessly Tracked
From ACM News

A Day in the Life of the Relentlessly Tracked

Controversy is raging over a court order allowing the FBI and the National Security Agency to seize aggregate information of millions of Verizon customer phone...

Nsa Collecting Phone Records of Millions of Verizon Customers Daily
From ACM News

Nsa Collecting Phone Records of Millions of Verizon Customers Daily

The National Security Agency is currently collecting the telephone records of millions of US customers of Verizon, one of America's largest telecoms providers,...

They're Coming for Your DNA
From ACM News

They're Coming for Your DNA

DNA analysis is the major crime-solving advance of our time.

Fixing America's Patent Problem Means Going Beyond Trolls
From ACM News

Fixing America's Patent Problem Means Going Beyond Trolls

The so-called patent troll has become one of the tech industry’s favorite monsters in recent years, and on Tuesday the Obama administration announced it would ...

Presidential Candidate: ­.s., Israel Wary of Iran's Cyber Power
From ACM News

Presidential Candidate: ­.s., Israel Wary of Iran's Cyber Power

Supreme Leader's top aide Ali Akbar Velayati, who is also a candidate in Iran's presidential election, hailed the Iranian IT engineers and experts for their good...

­ssr's Old Domain Name Attracts Cybercriminals
From ACM News

­ssr's Old Domain Name Attracts Cybercriminals

The Soviet Union disappeared from the map more than two decades ago. But online an 'e-vil empire' is thriving.

In China, Big Data Is Becoming Big Business
From ACM Careers

In China, Big Data Is Becoming Big Business

With 1.3 billion people, a quickly expanding urban economy, and rising rates of Internet and smartphone penetration, China generates an immense amount of data annually...

This Pentagon Project Makes Cyberwar as Easy as Angry Birds
From ACM News

This Pentagon Project Makes Cyberwar as Easy as Angry Birds

The target computer is picked. The order to strike has been given. All it takes is a finger swipe and a few taps of the touchscreen, and the cyberattack is prepped...

Flame One Year Later
From ACM Opinion

Flame One Year Later

It's been a year since the first reports of the Flame malware surfaced, and looking back at the 12 months since then, it seems more and more each day that the discovery...

Inside Google's Secret Lab
From ACM Careers

Inside Google's Secret Lab

Last February, Astro Teller, the director of Google's secretive research lab, Google X, went to seek approval from Chief Executive Officer Larry Page for an unlikely...

German Railways to Test Anti-Graffiti Drones
From ACM News

German Railways to Test Anti-Graffiti Drones

The idea is to use airborne infra-red cameras to collect evidence, which could then be used to prosecute vandals who deface property at night.

Marketing to the Big Data Inside ­S
From ACM News

Marketing to the Big Data Inside ­S

Companies market to you according to your shopping habits, your age, your salary, and your social-media activities. In the future, they may be able to advertise...

Hackers Find China Is Land of Opportunity
From ACM Careers

Hackers Find China Is Land of Opportunity

Name a target anywhere in China, an official at a state-owned company boasted recently, and his crack staff will break into that person's computer, download the...

ACM Honors Computing Innovators
From Communications of the ACM

ACM Honors Computing Innovators

ACM's awards celebrate achievements in networks, information retrieval, multi-agent systems, computer science education, versatile compiler technologies, and more...

What Will Hackers Do with the New Kinect?
From ACM Careers

What Will Hackers Do with the New Kinect?

Microsoft announced a new version of the Xbox One earlier this week, and with it an improved and essentially reinvented version of Kinect, the company's body- and...

One Day Your Phone Will Know If You're Happy or Sad
From ACM Careers

One Day Your Phone Will Know If You're Happy or Sad

As much time as we spend with our cell phones and laptops and tablets, it's still pretty much a one-way relationship.

Making Quantum Encryption Practical
From ACM News

Making Quantum Encryption Practical

One of the many promising applications of quantum mechanics in the information sciences is quantum key distribution (QKD) in which the counterintuitive behavior...

How to Hack a Nation's Infrastructure
From ACM News

How to Hack a Nation's Infrastructure

I'm watching a live video feed of people visiting a cafe in London.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account