acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


AI Designs Its Own Video Game
From ACM News

AI Designs Its Own Video Game

It is never going to compete with the latest iteration of Call of Duty, but then Space Station Invaders is not your typical blockbuster video game. While modern...

From ACM Careers

Hackers Vie For More Than $1 Million to Take Down Browsers

As alleged hackers from LulzSec and Anonymous contemplate the possibility of a life behind bars, other hackers are limbering up in Canada this week to vie for more...

Hackers Arrested as One Turns Witness
From ACM News

Hackers Arrested as One Turns Witness

Federal prosecutors brought charges against a group of men allegedly behind "LulzSec"—a globe-spanning collective of computer hackers who wreaked havoc on companies...

The Bright Side of Being Hacked
From ACM News

The Bright Side of Being Hacked

Hackers operating under the banner Anonymous have been poking a finger in the eye of one private company after another for two years now.  

Stuxnet: Computer Worm Opens New Era of Warfare
From ACM News

Stuxnet: Computer Worm Opens New Era of Warfare

For the past few months now, the nation's top military, intelligence and law enforcement officials have been warning Congress and the country about a coming cyberattack...

Number 1 on Army's Shopping List: Wireless Broadband
From ACM News

Number 1 on Army's Shopping List: Wireless Broadband

The most important element of the Army's effort to modernize itself doesn't shoot. You can't ride in it. You can't wear it for protection against homemade bombs...

Why the Security Industry Never Actually Makes ­s Secure
From ACM News

Why the Security Industry Never Actually Makes ­s Secure

Every year, security vendors gather at the RSA conference here to reaffirm their commitment to fencing out hackers and keeping data safe. And every year, corporate...

Behold the Cheetah Robot. The Singularity Is Nigh!
From ACM News

Behold the Cheetah Robot. The Singularity Is Nigh!

Big defense budgets during the aughts financed the deployment of thousands of robots, including unmanned aerial and underwater vehicles, to Iraq and Afghanistan...

The Little White Box That Can Hack Your Network
From ACM News

The Little White Box That Can Hack Your Network

When Jayson E. Street broke into the branch office of a national bank in May of last year, the branch manager could not have been more helpful.

Here's The Best (and Prettiest) Way To See Exactly How You're Being Tracked Online
From ACM News

Here's The Best (and Prettiest) Way To See Exactly How You're Being Tracked Online

Firefox-browser provider Mozilla has released an awesome new tool for seeing how you're being tracked on the Web.

From ACM News

I'm Being Followed: How Google

This morning, if you opened your browser and went to NYTimes.com, an amazing thing happened in the milliseconds between your click and when the news appeared on...

Et Tu, Google? Android Apps Can Also Secretly Copy Photos
From ACM News

Et Tu, Google? Android Apps Can Also Secretly Copy Photos

It's not just Apple. Photos are vulnerable on Android phones, too.

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says
From ACM News

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says

In the midst of an ongoing turf battle over how big a role the National Security Agency should play in securing the nation’s critical infrastructure, a Defense...

Despite Intrusions, Chances Of U.s.-China Cyberwar Are Small
From ACM News

Despite Intrusions, Chances Of U.s.-China Cyberwar Are Small

A panel of security and policy experts said that, despite dire warnings about the information warfare capabilities of China and other developing nations, the risk...

For Impatient Web Users, an Eye Blink Is Just Too Long to Wait
From ACM News

For Impatient Web Users, an Eye Blink Is Just Too Long to Wait

Wait a second. No, that's too long.

From ACM News

How a Web Link Can Take Control of Your Phone

A chilling demonstration to a small, packed room at the RSA security conference showed how clicking a single bad Web link while using a phone running Google's Android...

­.s. Wants You to Hunt Fugitives With Twitter
From ACM News

­.s. Wants You to Hunt Fugitives With Twitter

A worldwide manhunt kicks off at the end of March—a search across America and Europe for five fugitives, identifiable only by their mugshots.

Google: Technology Is Making Science Fiction Real
From ACM News

Google: Technology Is Making Science Fiction Real

Google executive chairman Eric Schmidt predicted that rapid advances in technology will soon transform science fiction into reality—meaning people will have driverless...

Microsoft Ponders Future of Kinect, Tech
From ACM News

Microsoft Ponders Future of Kinect, Tech

When Microsoft thinks about the future of technology, it seems to do so with its stomach.

In the World of Big Data, Privacy Invasion Is the Business Model
From ACM News

In the World of Big Data, Privacy Invasion Is the Business Model

Recent weeks have seen a lot of (overdue) talk about privacy and technology. There was theflap over Path and other mobile apps uploading your phone's address books...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account