acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Why Has BlackBerry Been Blamed for the London Riots?
From ACM News

Why Has BlackBerry Been Blamed for the London Riots?

The whole of London is taking stock after outbreaks of violence and looting across the capital. Ealing, Camden, Peckham, Clapham, Lewisham, Woolwich, and Hackney...

From ACM News

Network Effects: Social Media's Role in the London Riots

Facebook and Twitter can fuel uprisings by allowing participants to coordinate action and to see themselves as part of a larger movement.

From ACM News

Web Tracking Has Become a Privacy Time Bomb

For more than a decade, tracking systems have been taking note of where you go and what you search for on the Web—without your permission. Today many of the personal...

From ACM TechNews

Ben-Gurion University of the Negev Researchers Develop Webcam Tool to Improve Posture of Office Workers

A multidisciplinary team at Ben-Gurion University of the Negev has developed a desktop Webcam tool that could help improve the ergonomic posture of office workers...

From ACM News

Black Hat: Legal Pitfalls of Investigating Mobile

Hackers today are testing mobile devices ever more strenuously, but the work often stands on shaky legal ground, according to Jennifer Granick, an attorney for...

Building Robots that Understand Human Emotions and Make People Healthier
From ACM News

Building Robots that Understand Human Emotions and Make People Healthier

 For most of us, the closest we get to a robot in daily life is a Roomba. But Dr. Cynthia Breazeal, director of the Personal Robots Group at the MIT Media Lab...

Nasa Spacecraft Data Suggest Water Flowing on Mars
From ACM News

Nasa Spacecraft Data Suggest Water Flowing on Mars

Observations from NASA's Mars Reconnaissance Orbiter have revealed possible flowing water during the warmest months on Mars.

From ACM News

Your Smartphone: A New Frontier For Hackers

Last week, security researchers uncovered yet another strain of malicious software aimed at smartphones that run Google's popular Android operating system. The...

From ACM News

At a Hacker Conference, Plenty of Friendly Feds

 Why are the Feds hobnobbing with hackers? Defcon, a convention of computer hackers here, was crawling with federal agents on Friday. They smiled, shook hands,...

From ACM News

Your Face

Imagine being able to sit down in a bar, snap a few photos of people, and quickly learn who they are, who their friends are, where they live, what kind of music...

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls
From ACM News

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls

What do you do when the target you’re spying on slips behind his home-security gates and beyond your reach? Launch your personal, specially equipped WASP drone—short...

Can Video Kill the Credit-Card Form?
From ACM News

Can Video Kill the Credit-Card Form?

The days of tediously having to punch in credit-card details whenever you make an online purchase may be numbered, thanks to a new payment system that turns any...

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future
From ACM News

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future

Ever since Google announced that its Android phones would be equipped with a "digital wallet" that allows users to pay for things simply by touching their phone...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...

From ACM News

Operation Shady RAT May Be the Biggest Hack in History but Is No Surprise

Anybody involved in the IT and cybersecurity industry knows that every major industry and government agency around the world is under threat of intrusion through...

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems
From ACM News

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems

A security researcher has uncovered a slew of vulnerabilities in Siemens industrial control systems, including a hard-coded password, that would let attackers...

Mapping the Most Complex Object in the Known ­niverse
From ACM News

Mapping the Most Complex Object in the Known ­niverse

It's paint-by-numbers for neuroscientists. At the Max-Planck Institute for Medical Research in Heidelberg, Germany, researchers have devised a faster way of computing...

China Aims to Renew Status As Scientific Superpower
From ACM News

China Aims to Renew Status As Scientific Superpower

China was probably the world's earliest technological superpower, inventing the plow, the compass, gunpowder, and block printing. Then, science in the Middle...

Major Breakthrough Claimed in Wireless Technology
From ACM News

Major Breakthrough Claimed in Wireless Technology

Dropped calls, unsent texts, painfully slow Internet connections and overcrowded Wi-Fi hot spots have become a bane of modern life. But veteran valley entrepreneur...

From ACM News

Pentagon Seeks a Few Good Social Networkers

The Pentagon is developing plans to use social networking sites like Facebook and Twitter as both a resource and a weapon in future conflicts. Its research and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account