acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Data Optimization in Developing Nations
From Communications of the ACM

Data Optimization in Developing Nations

Artificial intelligence and machine learning could expand access to health care, improve the quality of education, and respond effectively to natural disasters...

I, Domestic Robot
From Communications of the ACM

I, Domestic Robot

With recent advances in laser rangefinders, faster algorithms, and open source robotic operating systems, researchers are increasing domestic robots' semantic and...

From ACM News

What Location Data, Exactly, Does an Iphone Reveal?

On Wednesday, security researchers demonstrated that the certain versions of the iPhone and iPad were logging and storing location data about their owners. Long...

Meet the Fastest Public-Key Algorithm Few Have Even Heard Of
From ACM TechNews

Meet the Fastest Public-Key Algorithm Few Have Even Heard Of

The Accredited Standards Committee X9 has approved NTRUEncrypt, a public-key algorithm that  is considered to be faster than both elliptic-curve cryptography and...

Microsoft Browser Would Offer Personalization Along With Privacy Protection
From ACM TechNews

Microsoft Browser Would Offer Personalization Along With Privacy Protection

Microsoft researchers have developed RePriv, a browser that analyzes users' online behavior and controls how their personal information is released to sites that...

From ACM News

The Botnets That Won't Die

New communications schemes could make zombie PC networks far more difficult to shut down.

From ACM News

Covert Hard Drive Fragmentation Embeds a Spy's Secrets

Good news for spies. There is now a way to hide data on a hard drive without using encryption. Instead of using a cipher to scramble text, the method involves...

Are You Following a Bot?
From ACM Opinion

Are You Following a Bot?

How to manipulate social movements by hacking Twitter.

From ACM News

CIA Recipe For Invisible Ink Among Newly Released Wwi-Era Documents

So you want to open sealed envelopes without getting caught? Here’s the secret, according to one of the six oldest classified documents in possession of the Central...

From ACM News

The Marketing Gadget That Tracks Brainwaves As You Watch Tv

Would you feel comfortable if market researchers could know your every thought? A headband designed by San Francisco firm EmSense can sense your brainwaves as...

From ACM News

Iranian General Accuses Siemens of Helping ­.s., Israel Build Stuxnet

An Iranian military commander Saturday accused the German electronics giant Siemens with helping U.S. and Israeli teams craft the Stuxnet worm that attacked his...

Constant Connection
From ACM News

Constant Connection

For most of the 20th century, the paradigm of wireless communication was a radio station with a single high-power transmitter. As long as you were within 20 miles...

Just How Creepy Is 'creepy'? A Test-Drive
From ACM News

Just How Creepy Is 'creepy'? A Test-Drive

You probably know that some Internet and cell phone applications like Foursquare or Twitter can broadcast your location to the world. And you might know that...

From ACM TechNews

Malware Writers Making Code Tougher to Decode, Harder to Find

Reverse-engineering experts say that malware writers are doing a better job of hiding their code and making it difficult to crack. 

Reitinger's Quest: Build a Safer Internet
From ACM TechNews

Reitinger's Quest: Build a Safer Internet

U.S. Department of Homeland Security deputy undersecretary Philip Reitinger has established the goal of developing a more secure Internet ecosystem, which he says...

Busting the Botnets
From ACM News

Busting the Botnets

They're the scourge of the Internet—networks containing thousands or even millions of virus-infected, remote-controlled PCs. These so-called "botnets" send out...

Cameras Read License Plates, Helping City's Police
From ACM News

Cameras Read License Plates, Helping City's Police

When Luis Zeledon was captured by detectives, it was probably safe to say that he had not intended to be found. He was hiding in someone else’s apartment in Queens...

Online Photos: Are They New Digital Fingerprints?
From ACM News

Online Photos: Are They New Digital Fingerprints?

For Mike Smith, Facebook is a fort for communicating freely with friends online. Within the confines of that giant yet access-restricted network, the music-software...

Expert Gives Tips on Safeguarding Against Data Theft
From ACM News

Expert Gives Tips on Safeguarding Against Data Theft

Nick Feamster, assistant professor at Georgia Tech's College of Computing and researcher at the Georgia Tech Information Security Center offers his expertise on...

From ACM News

U.s. Can Conduct Offsite Searches of Computers Seized at Borders, Court Rules

Laptop computers and other digital devices carried into the U.S. may be seized from travelers without a warrant and sent to a secondary site for forensic inspection...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account