Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectComputers And Society
authorBloomberg

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hackers Devise Wireless Methods For Stealing Atm Users' Pins
From ACM News

Hackers Devise Wireless Methods For Stealing Atm Users' Pins

Pilfering the personal identification numbers of financial accounts, a potential jackpot for hackers, is tougher to pull off thanks to data encryption and other...

The U.s. Government Wants 6,000 New 'cyber Warriors' By 2016
From ACM Careers

The U.s. Government Wants 6,000 New 'cyber Warriors' By 2016

The Pentagon plans to triple its cybersecurity staff by 2016, U.S. Secretary of Defense Chuck Hagel announced recently.

Stodgy, Old Baseball Invents the Future of Instant Replay
From ACM News

Stodgy, Old Baseball Invents the Future of Instant Replay

Major League Baseball is not inclined to tinker much with America's pastime, aside from the occasional tweak to the number of teams in the playoffs.

Justice Scalia Looks Forward to Hearing Nsa Spying Case
From ACM News

Justice Scalia Looks Forward to Hearing Nsa Spying Case

Justice Antonin Scalia signaled during a law school talk on March 21 that the Supreme Court is very much aware that legal challenges to the National Security Agency's...

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers
From ACM News

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers

The tense on-the-ground standoff in Ukraine has already tipped into open hostilities online, with hackers targeting members of parliament and state agencies.

The ­nlikely Tale of How Arm Came to Rule the World
From ACM News

The ­nlikely Tale of How Arm Came to Rule the World

This is a story about ARM Holdings, the mobile technology company.

Willow Garage's Last Days
From ACM News

Willow Garage's Last Days

In 2006, Scott Hassan, a prolific software engineer, started a research lab dedicated to robotics called Willow Garage.

The Race to Buy the Human Brains Behind Deep Learning Machines
From ACM Careers

The Race to Buy the Human Brains Behind Deep Learning Machines

Any aspiring science fiction writer looking for a good protagonist could do worse than ripping off the Wikipedia page for Demis Hassabis.

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built
From ACM News

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built

Last year, Edward Snowden turned over to the Guardian, a British newspaper, some 58,000 classified U.S. government documents.

The Bitcoin-Mining Arms Race Heats Up
From ACM News

The Bitcoin-Mining Arms Race Heats Up

Joel Flickinger's two-bedroom home in the hills above Oakland, Calif., hums with custom-built computing gear.

Does Bitcoin Have a Future in Politics?
From ACM News

Does Bitcoin Have a Future in Politics?

Representative Steve Stockman (R-Tex.) is no stranger to provocative proposals.

The Hidden Technology That Makes Twitter Huge
From ACM News

The Hidden Technology That Makes Twitter Huge

Consider the tweet.

University of Waterloo: Silicon Valley's Canadian Feeder School
From ACM Careers

University of Waterloo: Silicon Valley's Canadian Feeder School

Recent engineering graduate Mike McCauley is living the dream.

Nsa Surveillance Makes For Strange Bedfellows
From ACM Opinion

Nsa Surveillance Makes For Strange Bedfellows

The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...

How Syrian Hackers Found the New York Times's Australian Weak Spot
From ACM News

How Syrian Hackers Found the New York Times's Australian Weak Spot

A hacking attack launched by the Syrian Electronic Army may have targeted the New York Timesand other U.S. media companies, but the weak link was Melbourne IT (...

How Big Data Could Help Identify the Next Felon—or Blame the Wrong Guy
From ACM Careers

How Big Data Could Help Identify the Next Felon—or Blame the Wrong Guy

Think of it as big data meets "Minority Report."

Medical Hacking Poses a Terrifying Threat, in Theory
From ACM News

Medical Hacking Poses a Terrifying Threat, in Theory

In the world of hypothetical cybercrime, not much is scarier than the hacked medical device.

Privacy Paradox: Americans Happy to Share Personal Data With Big Business
From ACM News

Privacy Paradox: Americans Happy to Share Personal Data With Big Business

It's official: Americans may freak out when government collects their data to track terrorists, but they would happily have banks use it to catch some jerk trying...

Danger Maps Backed By Alibaba Pinpoint Chinese Pollution
From ACM TechNews

Danger Maps Backed By Alibaba Pinpoint Chinese Pollution

Danger Maps, a crowdsourced mapping project, is helping users locate China's high pollution areas.

Spies Like ­s: How We All Helped Build Prism
From ACM Careers

Spies Like ­s: How We All Helped Build Prism

It used to be that the National Security Agency and its ilk had to pay through the nose for the latest in spying technology.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account