Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Who Owns Your Face?
From ACM News

Who Owns Your Face?

It takes a feast of facial imagery to teach a machine how to recognize an individual person.

New Quantum Gadget Could Make Contactless Payment More Secure
From ACM TechNews

New Quantum Gadget Could Make Contactless Payment More Secure

Researchers have developed a prototype gadget that transmits secret quantum keys to encrypt data sent from a mobile device to a payment terminal.

Scanners Can Be Hijacked to Perpetrate Cyberattacks
From ACM TechNews

Scanners Can Be Hijacked to Perpetrate Cyberattacks

Researchers have found a typical office scanner can be infiltrated and an organization's network compromised through it..

Protecting Web Users' Privacy
From ACM TechNews

Protecting Web Users' Privacy

Splinter is a new encryption system that disguises users' database queries so they reveal no private information.

Cybersecurity
From Communications of the ACM

Cybersecurity

2002 ACM Turing laureate Len Adleman, 2014 ACM Prize in Computing recipient Dan Boneh, 2015 ACM Grace Murray Hopper Award recipient Brent Waters, and ACM Fellows...

Hash Function SHA-1 is Broken
From ACM News

Hash Function SHA-1 is Broken

The industry should be scrambling for upgrades.   

Coders and Librarians Team Up to Save Scientific Data
From ACM TechNews

Coders and Librarians Team Up to Save Scientific Data

Software programmers, librarians, and others are archiving scientific data from government websites.

Inside the Hunt for Russia's Most Notorious Hacker
From ACM News

Inside the Hunt for Russia's Most Notorious Hacker

On the morning of December 30, the day after Barack Obama imposed sanctions on Russia for interfering in the 2016 US election, Tillmann Werner was sitting down...

Researchers Present Early Warning System for Mass Cyberattacks
From ACM TechNews

Researchers Present Early Warning System for Mass Cyberattacks

Researchers have developed an early warning system for massive distributed denial-of-service attacks.

HKBU Scholar Invents World's First 'Lip Password:' A Patented Double Security System for Identity Authentication
From ACM TechNews

HKBU Scholar Invents World's First 'Lip Password:' A Patented Double Security System for Identity Authentication

Researchers at Hong Kong Baptist University have developed new technology that utilizes a person's lip motions to create a password.

What if Quantum Computers Used Hard Drives Made of DNA?
From ACM News

What if Quantum Computers Used Hard Drives Made of DNA?

You've heard the hype: The quantum computer revolution is coming. Physicists say these devices will be fast enough to break every encryption method banks use today...

Doubts About Whether Internet Filters Protect Teenagers Online
From ACM TechNews

Doubts About Whether Internet Filters Protect Teenagers Online

Researchers surveyed 515 teenagers and their parents about whether they used technical tools to control or manage access to online content.

Why We Should Not Know Our Own Passwords
From ACM TechNews

Why We Should Not Know Our Own Passwords

There is active research transpiring in the area of unknowable password development.

It's Possible to Hack a Phone With Sound Waves, Researchers Show
From ACM News

It's Possible to Hack a Phone With Sound Waves, Researchers Show

A security loophole that would allow someone to add extra steps to the counter on your Fitbit monitor might seem harmless. But researchers say it points to the...

Tim Berners-Lee: I Invented the Web. Here Are Three Things We Need to Change to Save It
From ACM TechNews

Tim Berners-Lee: I Invented the Web. Here Are Three Things We Need to Change to Save It

World Wide Web pioneer Sir Tim Berners-Lee warns of three trends to be overcome in order to sustain the Web as beneficial for everyone.

Can Amazon Echo Help Solve a Murder? Police Will Soon Find Out.
From ACM News

Can Amazon Echo Help Solve a Murder? Police Will Soon Find Out.

A 2015 Arkansas murder case that had raised privacy questions surrounding "always-on" electronic home devices took a step forward last week after Amazon agreed...

Researchers Can Predict Terrorist Behaviors With More Than 90 Percent Accuracy
From ACM TechNews

Researchers Can Predict Terrorist Behaviors With More Than 90 Percent Accuracy

The Networked Pattern Recognition Framework works to predict future terrorist behaviors by defining past attack patterns.

How the CIA's Hacking Hoard Makes Everyone Less Secure
From ACM News

How the CIA's Hacking Hoard Makes Everyone Less Secure

When Wikileaks yesterday released a trove of documents purporting to show how the CIA hacks everything from smartphones to PCs to smart televisions, the agency's...

The Darknet Protects Itself by Being More Robust Against Attacks
From ACM TechNews

The Darknet Protects Itself by Being More Robust Against Attacks

Researchers have found the darknet is especially good at protecting users' privacy and anonymity because it can counter large cyberattacks on its own by spontaneously...

Wikileaks: The CIA Is Using Popular TVs, Smartphones and Cars to Spy on Their Owners
From ACM News

Wikileaks: The CIA Is Using Popular TVs, Smartphones and Cars to Spy on Their Owners

The latest revelations about U.S. government's powerful hacking tools potentially takes surveillance right into the homes and hip pockets of billions of users worldwide...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo