Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Pentagon's Seek-and-Destroy Mission for Counterfeit Electronics
From ACM News

The Pentagon's Seek-and-Destroy Mission for Counterfeit Electronics

The Pentagon has known for years that a significant number of the replacement parts it buys for its missile guidance and satellite systems contain substandard counterfeit...

How the Update Framework Improves Security of Software Updates
From ACM TechNews

How the Update Framework Improves Security of Software Updates

New York University professor Justin Cappos has been developing The Update Framework (TUF) for eight years to help organizations update their software securely....

Geeks v Government: The Battle Over Public Key Cryptography
From ACM News

Geeks v Government: The Battle Over Public Key Cryptography

Two graduate students stood silently beside a lectern, listening as their professor presented their work to a conference.

Scientists Can Blind a Self-Driving Car From Seeing Pedestrians
From ACM TechNews

Scientists Can Blind a Self-Driving Car From Seeing Pedestrians

Researchers have demonstrated it is possible to prevent machine-vision systems from seeing specific categories of objects in a scene.

Can Facebook Fix Its Own Worst Bug?
From ACM News

Can Facebook Fix Its Own Worst Bug?

In early January, I went to see Mark Zuckerberg at MPK20, a concrete-and-steel building on the campus of Facebook's headquarters, which sits across a desolate highway...

Every Continent, and One Time Lord, Turned Out for the March for Science
From ACM News

Every Continent, and One Time Lord, Turned Out for the March for Science

An estimated 600 March for Science rallies took place Saturday across the U.S., and across the globe.

Teaching a Driverless Car to Turn Left
From ACM TechNews

Teaching a Driverless Car to Turn Left

Getting driverless cars to make safe left turns at intersections is a key challenge for engineers, as they involve both psychology and technology.

Pinning Down Abuse on Google Maps
From ACM TechNews

Pinning Down Abuse on Google Maps

A collaboration between researchers at the University of California, San Diego and Google has enabled the Internet company to reduce the number of fraudulent businesses...

Could the US Take Out North Korea's Missiles Before Launch?
From ACM News

Could the US Take Out North Korea's Missiles Before Launch?

A failed missile launch in North Korea Sunday has brought renewed attention to reports that the United States is trying to degrade North Korea's missile capabilities...

Can a Supercomputing Algorithm Kill Gerrymandering?
From ACM TechNews

Can a Supercomputing Algorithm Kill Gerrymandering?

A new supercomputing algorithm can determine whether state legislative districts have been unfairly drawn, with the potential of reshaping U.S. electoral politics...

How YouTube's Shifting Algorithms Hurt Independent Media
From ACM Careers

How YouTube's Shifting Algorithms Hurt Independent Media

At the age of 21, David Pakman started a little Massachusetts community radio talk program.

Locking Out the Hackers
From ACM News

Locking Out the Hackers

New hardware, services are aimed at identifying malware before it has the chance to execute.

Don't Worry, Driverless Cars Are Learning From Grand Theft Auto
From ACM News

Don't Worry, Driverless Cars Are Learning From Grand Theft Auto

In the race to the autonomous revolution, developers have realized there aren't enough hours in a day to clock the real-world miles needed to teach cars how to...

Your Phone's Power Use Can Give Hackers an Opening
From ACM TechNews

Your Phone's Power Use Can Give Hackers an Opening

Researchers have shown even without a data cable, hackers can analyze a device's power needs to access users' private information.

We know What You're Watching (Even If It's Encrypted)
From ACM News

We know What You're Watching (Even If It's Encrypted)

I stand firm in the opinion that it's my basic, human right to binge-watch six hours of trashy detective shows on a Friday night with a silent phone in my lap and...

Using Randomness to Protect Election Integrity
From ACM TechNews

Using Randomness to Protect Election Integrity

Vanderbilt University professor Eugene Vorobeychik and colleagues have combined game theory and computer security expertise to design a method for auditing electoral...

'We All Love the Tomahawk:' A Brief History of U.S.'s Favorite Robotic Killer
From ACM News

'We All Love the Tomahawk:' A Brief History of U.S.'s Favorite Robotic Killer

In the early hours of Friday morning, two U.S. Navy guided-missile destroyers in the waters of the eastern Mediterranean Sea launched a barrage of Tomahawk Land...

Virginia Tech Professor Builds Algorithm to Detect Traces of Cyberbullying
From ACM TechNews

Virginia Tech Professor Builds Algorithm to Detect Traces of Cyberbullying

Virginia Polytechnic and State University professor Bert Huang is working to develop an automatic system for detecting cyberbullying.

Into the Breach
From ACM News

Into the Breach

Cyber ratings firms help companies evaluate the risks of doing business.

Canada Tries to Turn Its A.I. Ideas Into Dollars
From ACM Careers

Canada Tries to Turn Its A.I. Ideas Into Dollars

Long before Google started working on cars that drive themselves and Amazon was creating home appliances that talk, a handful of researchers in Canada—backed by...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo