acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Self-Driving Big Rigs Are Coming. Is America Ready?
From ACM News

Self-Driving Big Rigs Are Coming. Is America Ready?

Autonomous trucks that mostly stick to highways could make sense, both technologically and economically, in ways robotaxis have not.

NASA Pauses Psyche, a Mission to a Metal-Rich Asteroid
From ACM News

NASA Pauses Psyche, a Mission to a Metal-Rich Asteroid

Delays in setting up the spacecraft's navigation software mean the mission may not reach the asteroid until 2029 or 2030, rather than 2026.

Pentagon Unveils Plan to Make 'Responsible Military AI' More Than Just a Buzzword
From ACM News

Pentagon Unveils Plan to Make 'Responsible Military AI' More Than Just a Buzzword

The Pentagon cited supposed threats from China as a key motivator for ramping up "responsible" military applictions for artificial intelligence.

Tech Companies Want More Eyes in the Sky for Wildfire Season
From ACM TechNews

Tech Companies Want More Eyes in the Sky for Wildfire Season

The growing threat of wildfires in the U.S. has created opportunities for technology companies offering artificial intelligence solutions to help bring them under...

Instagram Rolls Out Age Verification, but Not to Keep Children Off App
From ACM TechNews

Instagram Rolls Out Age Verification, but Not to Keep Children Off App

Photo- and video-sharing platform Instagram has started using age verification tools to prevent account holders under 18 years old from changing their ages to over...

Seventy-Five Percent of the World's Top Websites Allow Bad Passwords
From ACM TechNews

Seventy-Five Percent of the World's Top Websites Allow Bad Passwords

Princeton University's Arvind Narayanan and colleagues found 75% of 120 top-ranked English-language websites permit weak passwords.

Explained: Why Cyber Hygiene is Very Important
From ACM News

Explained: Why Cyber Hygiene is Very Important

Microsoft India group head and director of government affairs Ashutosh Chadha said cybercrime costs economies more than $6 trillion (Rs. 4.6 crore crore) each year...

How Students Are Scrubbing Their Social Media Profiles
From ACM News

How Students Are Scrubbing Their Social Media Profiles

A new service for students flags inappropriate or offensive posts on Facebook, Twitter, and Instagram so would-be employers can see them in the best possible...

AI-Powered Archaeology Draws Out Hidden Evidence of Fire Use by Early Humans
From ACM TechNews

AI-Powered Archaeology Draws Out Hidden Evidence of Fire Use by Early Humans

Researchers used artificial intelligence to uncover evidence that ancient humans used fire at least 800,000 years ago at the Evron Quarry archaeological site in...

Mega Says It Can't Decrypt Your Files. POC Exploit Shows Otherwise
From ACM TechNews

Mega Says It Can't Decrypt Your Files. POC Exploit Shows Otherwise

A new report indicates Mega's file encryption architecture contains fundamental cryptography flaws enabling attackers to launch full key recovery attacks.

Hybrid Machine Learning Forecasts Lake Ecosystem Responses to Climate Change
From ACM TechNews

Hybrid Machine Learning Forecasts Lake Ecosystem Responses to Climate Change

Researchers applied a hybrid empirical dynamic modeling methodology to predict the effects of climate change and phosphorus pollution on Switzerland's Lake Geneva...

Do Kwon's Crypto Empire Fell in a $40 Billion Crash. He's Got a New Coin for You.
From ACM News

Do Kwon's Crypto Empire Fell in a $40 Billion Crash. He's Got a New Coin for You.

Luna's relaunch might be the ultimate act of chutzpah by the South Korean entrepreneur.

Twitter Apologizes for Abusing User Security Information After $150 million FTC settlement
From ACM News

Twitter Apologizes for Abusing User Security Information After $150 million FTC settlement

n addition to the $150 million penalty, Twitter agreed to notify users that it misused the security data.

Cybercriminals Eye Biometrics
From ACM News

Cybercriminals Eye Biometrics

Biometric markers are increasingly popular targets of data theft, potentially endangering far more than your locally stored information.

Many Russian Cyberattacks Failed in First Months of Ukraine War, Study Says
From ACM News

Many Russian Cyberattacks Failed in First Months of Ukraine War, Study Says

A report published by Microsoft also found that Moscow's disinformation campaign to establish a narrative of the war favorable to Russia was doing better than expected...

'Privacy Doesn't Matter,' Screams the Microsoft Deal with DuckDuckGo
From ACM News

'Privacy Doesn't Matter,' Screams the Microsoft Deal with DuckDuckGo

DuckDuckGo isn't as private as you think, facing criticism over its tracking agreement with Microsoft.

DARPA Report Finds Vulnerabilities in Blockchain Tech, Non-Secure Crypto Transactions
From ACM TechNews

DARPA Report Finds Vulnerabilities in Blockchain Tech, Non-Secure Crypto Transactions

Researchers vetted the security of blockchain software's distributed ledger technologies for the U.S. Defense Advanced Research Projects Agency (DARPA).

Meta Agrees to Alter Ad Technology in Settlement with U.S.
From ACM TechNews

Meta Agrees to Alter Ad Technology in Settlement with U.S.

Meta agreed to change its advertising technology and to pay a penalty as part of a settlement over allegations it had discriminated against Facebook users.

Google Wants to Challenge AI with 200 Tasks, to Replace the Turing Test
From ACM TechNews

Google Wants to Challenge AI with 200 Tasks, to Replace the Turing Test

Artificial intelligence researchers have proposed an update to the Turing test for rating the capabilities of AI technology.

What Quantum Information, Snowflakes Have in Common, and What We Can Do About It
From ACM TechNews

What Quantum Information, Snowflakes Have in Common, and What We Can Do About It

Researchers have demonstrated the ability to read out signals from a superconducting quantum bit (qubit) using laser light, without destroying it.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account