Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cyber Threat Info Sharing Made Easier
From ACM TechNews

Cyber Threat Info Sharing Made Easier

The next iteration of the Structured Threat Information eXchange machine-to-machine cyberthreat information-sharing language is nearing completion.

Could the US Take Out North Korea's Missiles Before Launch?
From ACM News

Could the US Take Out North Korea's Missiles Before Launch?

A failed missile launch in North Korea Sunday has brought renewed attention to reports that the United States is trying to degrade North Korea's missile capabilities...

Scientists Develop a Novel Algorithm Inspired by Bee Colonies to Help Dismantling Criminal Social Networks
From ACM TechNews

Scientists Develop a Novel Algorithm Inspired by Bee Colonies to Help Dismantling Criminal Social Networks

Researchers have developed an algorithm designed to counter both physical and virtual threats to social networks.

Locking Out the Hackers
From ACM News

Locking Out the Hackers

New hardware, services are aimed at identifying malware before it has the chance to execute.

The Dark Secret at the Heart of AI
From ACM TechNews

The Dark Secret at the Heart of AI

Some experts warn deep-learning artificial intelligence technologies cannot be adopted without reservations if their creators cannot understand how they reason....

Supercomputer Simulation Offers Peek at the Future of Quantum Computers
From ACM TechNews

Supercomputer Simulation Offers Peek at the Future of Quantum Computers

Researchers from the Swiss Federal Institute of Technology Zurich in Switzerland have used the fifth-most powerful supercomputer in the world to simulate the behavior...

Your Phone's Power Use Can Give Hackers an Opening
From ACM TechNews

Your Phone's Power Use Can Give Hackers an Opening

Researchers have shown even without a data cable, hackers can analyze a device's power needs to access users' private information.

We know What You're Watching (Even If It's Encrypted)
From ACM News

We know What You're Watching (Even If It's Encrypted)

I stand firm in the opinion that it's my basic, human right to binge-watch six hours of trashy detective shows on a Friday night with a silent phone in my lap and...

An Algorithm That Hides Your Online Tracks With Random Footsteps
From ACM TechNews

An Algorithm That Hides Your Online Tracks With Random Footsteps

Steven Smith at MIT's Lincoln Laboratory has developed an algorithmic technique to thwart the collection of online users' browsing history. The algorithm conceals...

That Fingerprint Sensor on Your Phone Is Not as Safe as You Think
From ACM News

That Fingerprint Sensor on Your Phone Is Not as Safe as You Think

Fingerprint sensors have turned modern smartphones into miracles of convenience.

DARPA Will Bake Cybersecurity Into Circuits
From ACM TechNews

DARPA Will Bake Cybersecurity Into Circuits

DARPA this month plans to detail its System Security Integrated Through Hardware and Firmware program, with the goal of developing new integrated circuit architectures...

Melding Mind and Machine: How Close Are We?
From ACM Opinion

Melding Mind and Machine: How Close Are We?

Just as ancient Greeks fantasized about soaring flight, today's imaginations dream of melding minds and machines as a remedy to the pesky problem of human mortality...

Using Randomness to Protect Election Integrity
From ACM TechNews

Using Randomness to Protect Election Integrity

Vanderbilt University professor Eugene Vorobeychik and colleagues have combined game theory and computer security expertise to design a method for auditing electoral...

The Dark Secret at the Heart of AI
From ACM News

The Dark Secret at the Heart of AI

Last year, a strange self-driving car was released onto the quiet roads of Monmouth County, New Jersey.

Virginia Tech Professor Builds Algorithm to Detect Traces of Cyberbullying
From ACM TechNews

Virginia Tech Professor Builds Algorithm to Detect Traces of Cyberbullying

Virginia Polytechnic and State University professor Bert Huang is working to develop an automatic system for detecting cyberbullying.

Machines Learning Evolves, and Hackers Stand to Gain
From ACM TechNews

Machines Learning Evolves, and Hackers Stand to Gain

Experts say the growing pervasiveness and maturity of machine learning makes it an increasingly attractive candidate for cybersecurity applications.

Into the Breach
From ACM News

Into the Breach

Cyber ratings firms help companies evaluate the risks of doing business.

Few Keep Track of Their Personal Data on the Net
From ACM TechNews

Few Keep Track of Their Personal Data on the Net

A study found that few users understand how their personal data are compiled and stored on the Internet.

Google's Video AI Was Tricked Into Thinking a Video About Apes Was About Spaghetti
From ACM TechNews

Google's Video AI Was Tricked Into Thinking a Video About Apes Was About Spaghetti

Researchers have successfully tricked Google's Cloud Video Intelligence application programming interface into identifying a video about gorillas as one dealing...

Virginia Tech Researchers: Android Apps Can Conspire to Mine Information From Your Smartphone
From ACM TechNews

Virginia Tech Researchers: Android Apps Can Conspire to Mine Information From Your Smartphone

Researchers say they have conducted the first-ever large-scale systematic study of how the trusty applications on Android phones are able to talk to one another...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo