acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectLegal Aspects
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Marketing to the Big Data Inside ­S
From ACM News

Marketing to the Big Data Inside ­S

Companies market to you according to your shopping habits, your age, your salary, and your social-media activities. In the future, they may be able to advertise...

What Will Hackers Do with the New Kinect?
From ACM Careers

What Will Hackers Do with the New Kinect?

Microsoft announced a new version of the Xbox One earlier this week, and with it an improved and essentially reinvented version of Kinect, the company's body- and...

From ACM News

How Today's Sensors Could Make Tomorrow's Cars Safer

Driverless cars haven’t hit the roads yet, but computers are already helping to slow down or stop a car in situations when a crash is imminent.

How Wireless Carriers Are Monetizing Your Movements
From ACM News

How Wireless Carriers Are Monetizing Your Movements

Wireless operators have access to an unprecedented volume of information about users' real-world activities, but for years these massive data troves were put to...

Interview with Brain Project Pioneer: Miyoung Chun
From ACM Opinion

Interview with Brain Project Pioneer: Miyoung Chun

Brain Research through Advancing Innovative Neurotechnologies (BRAIN) project, which President Obama announced in his State of the Union address in February, will...

Clues Suggest Malware Is Moving from Pcs to Mobile Devices
From ACM News

Clues Suggest Malware Is Moving from Pcs to Mobile Devices

The fact that smartphones and tablets don't need antivirus software or regular software updates is a major reason for their popularity.

Autopsy of a Dead Social Network
From ACM Careers

Autopsy of a Dead Social Network

Friendster is a social network that was founded in 2002, a year before Myspace and two years before Facebook.

Exposé of Chinese Data Thieves Reveals Sloppy Tactics
From ACM News

Exposé of Chinese Data Thieves Reveals Sloppy Tactics

A beige office block in Shanghai's suburbs belonging to the Chinese army became world famous on Tuesday after Mandiant, a Washington-based computer security company...

Welcome to the Malware-Industrial Complex
From ACM News

Welcome to the Malware-Industrial Complex

Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating...

Why China's Homemade Microchips Will Struggle to Displace Western Giants
From ACM Opinion

Why China's Homemade Microchips Will Struggle to Displace Western Giants

If China's ultimate aim in the sphere of technology is to become completely self-sufficient, it is well on the way to achieving this ambitious goal.

The Man Looking to Turn Samsung Into a Silicon Valley Trendsetter
From ACM Opinion

The Man Looking to Turn Samsung Into a Silicon Valley Trendsetter

Samsung Electronics is a company at the top of its game, having become the world’s leading smartphone manufacturer in the last year.

How to Steal Data from Your Neighbor in the Cloud
From ACM News

How to Steal Data from Your Neighbor in the Cloud

Cloud computing teaches people not to worry about physical equipment for hosting data and running software.

Why You Can't Vote Online Tuesday
From ACM News

Why You Can't Vote Online Tuesday

A decade and a half into the Web revolution, we do much of our banking and shopping online. So why can't we vote over the Internet? The answer is that voting presents...

The States with the Riskiest Voting Technology
From ACM News

The States with the Riskiest Voting Technology

Next Tuesday's presidential election will likely be extremely close, magnifying the potential impact of vote-counting errors.

Computer Viruses Are 'rampant' on Medical Devices in Hospitals
From ACM News

Computer Viruses Are 'rampant' on Medical Devices in Hospitals

Computerized hospital equipment is increasingly vulnerable to malware infections, according to participants in a recent government panel. These infections can clog...

Ever Wondered What a Live Botnet Looks Like?
From ACM News

Ever Wondered What a Live Botnet Looks Like?

The idea of a network of malware-infected zombie computers rigged to do the bidding of criminals conjures up a frightening image on its own. A new visualization...

Stuxnet Tricks Copied By Computer Criminals
From ACM News

Stuxnet Tricks Copied By Computer Criminals

Malicious code apparently used by governments to spy on, harass, and sabotage one another has grabbed headlines in recent years, yet the highly targeted nature...

From ACM News

Hey, Hackers: Defense Is Sexy, Too

Pleasing the crowd at the Black Hat and Def Con computer security conferences that took place in Las Vegas last week is relatively easy: simply hop on stage and...

Nsa Boss Wants More Control Over the 'net
From ACM News

Nsa Boss Wants More Control Over the 'net

The U.S. Internet's infrastructure needs to be redesigned to allow the NSA to know instantly when overseas hackers might be attacking public or private infrastructure...

From ACM News

Gps Weakness Could Enable Mass Smartphone Hacking

Weaknesses in the technology that allows smartphone users to pinpoint themselves on a map, or check into restaurants and bars using apps such as Foursquare, could...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account