Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorNew Scientist

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Robotic Elephant Trunk Can Learn Tasks on Its Own
From ACM TechNews

Robotic Elephant Trunk Can Learn Tasks on Its Own

Researchers  used three-dimensional printing to create a robotic elephant trunk that uses artificial intelligence to emulate how sensory input triggers synaptic ...

Google Uses Underwater Fiber-Optic Cable to Detect Earthquakes
From ACM TechNews

Google Uses Underwater Fiber-Optic Cable to Detect Earthquakes

A submarine fiber-optic cable owned by Google was used by researchers to detect earthquakes and ocean waves generated by storms.

Quantum Internet Signals Beamed Between Drones a Kilometer Apart
From ACM TechNews

Quantum Internet Signals Beamed Between Drones a Kilometer Apart

Researchers have sent entangled photons between two 35-kilogram drones located a kilometer apart, a development that could pave the way for quantum encryption. ...

Voice Assistant Recordings Could Reveal What Someone Nearby Is Typing
From ACM TechNews

Voice Assistant Recordings Could Reveal What Someone Nearby Is Typing

A machine learning system can be used with voice assistants to detect typing on touchscreens nearby, using artificial intelligence (AI) tools to determine what...

Software Can Spy on What You Type in Video Calls by Tracking Your Arms
From ACM TechNews

Software Can Spy on What You Type in Video Calls by Tracking Your Arms

A new model can track the movement of the shoulders and arms of a person typing during a video call to determine what they are typing.

Uber, Lyft Pricing Algorithms Charge More in Non-White Areas
From ACM TechNews

Uber, Lyft Pricing Algorithms Charge More in Non-White Areas

George Washington University researchers found apparent racial bias in pricing algorithms used by ride-hailing companies like Uber and Lyft.

U.S. Voting Data from Millions of People is Being Traded on the Dark Web
From ACM TechNews

U.S. Voting Data from Millions of People is Being Traded on the Dark Web

Researchers have found that data on millions of U.S. voters is being illegally traded on parts of the Internet not searchable using normal means.

Fake News Gets Shared More When It is Angry, Anxiety-Inducing
From ACM TechNews

Fake News Gets Shared More When It is Angry, Anxiety-Inducing

Researchers in China have found that fake news may go viral more quickly when it uses words associated with anger.

U.S. Military Facial Recognition System Could Work From 1 Kilometer Away
From ACM TechNews

U.S. Military Facial Recognition System Could Work From 1 Kilometer Away

The U.S. Special Operations Command  is developing a portable facial recognition system that can identify individuals from 1 kilometer (0.6 miles) off. 

China is Using Mass Surveillance Tech to Fight Coronavirus Spread
From ACM TechNews

China is Using Mass Surveillance Tech to Fight Coronavirus Spread

The Chinese government is working with technology companies to monitor citizens and track confirmed cases of people infected with the coronavirus.

SIM Swapping, Poor Web Security Put Millions at Risk
From ACM TechNews

SIM Swapping, Poor Web Security Put Millions at Risk

Researchers at Princeton University have found that two-factor authentication is easily hackable and could put millions of people at risk.

Hackers Are Stealing Computer Power to Make Millions in Cryptocurrency
From ACM TechNews

Hackers Are Stealing Computer Power to Make Millions in Cryptocurrency

Groups of hackers are stealing millions of dollars through cryptojacking, which works by illicitly harnessing the computing power of thousands to mine cryptocurrency...

Quantum Network Joins Four People Together for Encrypted Messaging
From ACM TechNews

Quantum Network Joins Four People Together for Encrypted Messaging

A new network design uses quantum key distribution to secure messages among four users.

An AI Lie Detector Will Interrogate Travelers at Some E­ Borders
From ACM TechNews

An AI Lie Detector Will Interrogate Travelers at Some E­ Borders

An artificial intelligence-based lie detector system will be used on international travelers during a six-month pilot program at border crossings in Hungary, Latvia...

Think Your Surfing Is Secret in Private Browsing Mode? Think Again
From ACM TechNews

Think Your Surfing Is Secret in Private Browsing Mode? Think Again

Many computer users incorrectly believe private browsing protects them against computer viruses, targeted ads, geolocation, and tracking by employers and governments...

Researcher: 'we Should Be Worried' This Computer Thought a Turtle Was a Gun
From ACM TechNews

Researcher: 'we Should Be Worried' This Computer Thought a Turtle Was a Gun

The Massachusetts Institute of Technology's LabSix artificial intelligence team has demonstrated the first example of a three-dimensional object becoming "adversarial"...

Siri and Alexa Can Be Turned Against You By ­ltrasound Whispers
From ACM TechNews

Siri and Alexa Can Be Turned Against You By ­ltrasound Whispers

Researchers have developed a method to hijack intelligent voice assistant using sounds above the range of human hearing.

Your Broadband Provider Can ­se Your Smart Devices to Spy on You
From ACM TechNews

Your Broadband Provider Can ­se Your Smart Devices to Spy on You

Internet service providers can access the data on Internet-connected devices people use in their homes, even when those devices are set up to protect users' privacy...

Your Broadband Provider Can ­se Your Smart Devices to Spy on You
From ACM News

Your Broadband Provider Can ­se Your Smart Devices to Spy on You

How much of your privacy would you trade for a smarter home? Internet service providers (ISPs) can peek at the internet-connected devices people use in their own...

Sneaky Attacks Trick Ais Into Seeing or Hearing What's Not There
From ACM TechNews

Sneaky Attacks Trick Ais Into Seeing or Hearing What's Not There

A new technique could be used by hackers to trick autonomous cars into ignoring stop signs or prevent surveillance cameras from spotting a suspect.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account