acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Who's Behind the Wheel? Nobody.
From ACM Opinion

Who's Behind the Wheel? Nobody.

The Mazda Raceway at Laguna Seca is a 2.2-mile asphalt roller coaster plunging and soaring across California's tawny Monterey highlands.

Stuxnet Tricks Copied By Computer Criminals
From ACM TechNews

Stuxnet Tricks Copied By Computer Criminals

Security researchers warn that the techniques used in sophisticated, state-supported malware are being used by less-skilled programmers to target Web users.  

Facebook Raises Fears with Ad Tracking
From ACM News

Facebook Raises Fears with Ad Tracking

Facebook is working with a controversial data company called Datalogix that can track whether people who see ads on the social networking site end up buying those...

Facebook Can Id Faces, but Using Them Grows Tricky
From ACM News

Facebook Can Id Faces, but Using Them Grows Tricky

Facebook on Friday confronted a new obstacle over what to do with one of its most vital assets—pictures.

New Pcs That Ship With Preloaded Malware
From ACM News

New Pcs That Ship With Preloaded Malware

Open the bubble wrap on a new PC and the one thing you don't expect to find is preloaded malware.    

Official: Iran's N. Facilities Vaccinated Against Malwares
From ACM News

Official: Iran's N. Facilities Vaccinated Against Malwares

Head of Iran's Civil Defense Organization Brigadier General Gholam Reza Jalali stressed that Iranian experts and engineers are fully capable of detecting and repelling...

From ACM News

Iran Readies Domestic Internet System, Blocks Google

Iran plans to switch its citizens onto a domestic Internet network in what officials say is a bid to improve cyber security but which many Iranians fear is the...

Project Gives Computers a More Powerful Way to Detect Threats
From ACM TechNews

Project Gives Computers a More Powerful Way to Detect Threats

University of Texas at Dallas researchers have developed "space travel," a technique that automatically enables one computer in a virtual network to monitor another...

Redesigning the Data Center
From Communications of the ACM

Redesigning the Data Center

Faced with rising electricity costs, leading companies have begun revolutionizing the way data centers work, from the hardware to the buildings themselves.

Computer Science and the Three Rs
From Communications of the ACM

Computer Science and the Three Rs

A growing sense of crisis prevails as computer science searches for its place in the K--12 curriculum.

Big Data and Its Big Problems
From ACM News

Big Data and Its Big Problems

Imagine every thousandth blood cell in your body has a tiny radio transmitter in it.

Watch Your Tongue: Law Enforcement Speech Recognition System Stores Millions of Voices
From ACM News

Watch Your Tongue: Law Enforcement Speech Recognition System Stores Millions of Voices

Intercepting thousands of phone calls is easy for government agencies. But quickly analyzing the calls and identifying the callers can prove a difficult task.

Cameras Know You By Your Walk
From ACM News

Cameras Know You By Your Walk

Everyone knows how easy it is to recognize a friend or family member from their walk—even from a distance.

Bionic Eyes: Sensors That ­se Lookout's Brainwaves to Spot Trouble
From ACM News

Bionic Eyes: Sensors That ­se Lookout's Brainwaves to Spot Trouble

As good as surveillance technology has gotten at some tasks, computers still frequently fail when it comes to figuring out the difference between a threat and a...

Does Rise of Biometrics Mean a Future Without Anonymity?
From ACM News

Does Rise of Biometrics Mean a Future Without Anonymity?

Long envisioned as an alternative to remembering scores of computer passwords or lugging around keys to cars, homes and businesses, technology that identifies people...

'flame' Malware May Have Siblings, Study Finds
From ACM TechNews

'flame' Malware May Have Siblings, Study Finds

A new Flame malware report suggests that the malware's command-and-control interface was made to manage at least four different types of malware, meaning that there...

Stuxnet Tricks Copied By Computer Criminals
From ACM News

Stuxnet Tricks Copied By Computer Criminals

Malicious code apparently used by governments to spy on, harass, and sabotage one another has grabbed headlines in recent years, yet the highly targeted nature...

A Robot With a Reassuring Touch
From ACM News

A Robot With a Reassuring Touch

If you grab the hand of a two-armed robot named Baxter, it will turn its head and a pair of cartoon eyes—displayed on a tablet-size computer-screen "face"—will...

Twitter Reluctantly Coughs ­p Occupy Protester's Data
From ACM News

Twitter Reluctantly Coughs ­p Occupy Protester's Data

Twitter on Friday reluctantly complied with a judge's order to divulge the tweets and account information connected to an Occupy protester.

Flame C&c Server Analysis Reveals New Malware in the Wild
From ACM News

Flame C&c Server Analysis Reveals New Malware in the Wild

Forensic analysis of a number of Flame malware toolkit command-and-control servers revealed an additional three unidentified pieces of malicious code are under...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account