acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectHuman Computer Interaction
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


GitHub Tops 40 Million Developers as Python, Data Science, Machine Learning Popularity Surges
From ACM TechNews

GitHub Tops 40 Million Developers as Python, Data Science, Machine Learning Popularity Surges

Microsoft-owned GitHub's annual Octoverse report said its software developer community now exceeds 40 million developers.

Python Programming Language Creator Retires, Saying: 'It's Been an Amazing Ride'
From ACM News

Python Programming Language Creator Retires, Saying: 'It's Been an Amazing Ride'

The creator of the world's most popular programming language goes into retirement.

CPDoS Attack Can Poison CDNs to Deliver Error Pages Instead of Legitimate Sites
From ACM TechNews

CPDoS Attack Can Poison CDNs to Deliver Error Pages Instead of Legitimate Sites

Researchers  in Germany discovered a new type of Web attack that can compromise content delivery networks into caching and then serving error pages instead of legitimate...

Canberra Gives AU$32m for Autonomous Decision-Making Research
From ACM TechNews

Canberra Gives AU$32m for Autonomous Decision-Making Research

The Australian government is allocating AU$31.8 million (about US$21.5 million) to the Australian Research Council to study responsible, ethical, and inclusive...

Cybersecurity Giants to Combat Cyberthreats Under OASIS Umbrella
From ACM TechNews

Cybersecurity Giants to Combat Cyberthreats Under OASIS Umbrella

IBM, McAfee, and 16 more firms have launched an effort to address fragmentation and interoperability problems in cybersecurity.

La Trobe University Swaps Textbooks for VR, AR
From ACM TechNews

La Trobe University Swaps Textbooks for VR, AR

La Trobe University will swap out textbooks for augmented reality and virtual reality to teach anatomy as part of a 12-week pilot program.

Academics Find Vulnerabilities in Android's VoIP Components
From ACM TechNews

Academics Find Vulnerabilities in Android's VoIP Components

Scientists at China's OPPO ZIWU Cyber Security Lab, the Chinese University of Hong Kong, and Singapore Management University identified eight flaws in Android's...

PDFex Attack Can Exfiltrate Data from Encrypted PDF Files
From ACM TechNews

PDFex Attack Can Exfiltrate Data from Encrypted PDF Files

Researchers in Germany have developed a new attack that can extract and steal data from encrypted Portable Document Format (PDF)  files, sometimes without user...

Microsoft Poses Threat to Germany's Digital Sovereignty, Warns Study
From ACM TechNews

Microsoft Poses Threat to Germany's Digital Sovereignty, Warns Study

An analysis by PricewaterhouseCoopers has confirmed that the German government is too dependent on the software of just a few software providers.

Avast, French Police Take Over Malware Botnet, Disinfect 850,000 Computers
From ACM TechNews

Avast, French Police Take Over Malware Botnet, Disinfect 850,000 Computers

Antivirus maker Avast and the French National Police neutralized the back-end infrastructure of a malware botnet.

One in Five U.K. Schools Says Students Have Broken Into Computer Systems
From ACM TechNews

One in Five U.K. Schools Says Students Have Broken Into Computer Systems

A cybersecurity audit found 21% of 430 U.K. schools had their computers, networks, or servers hacked by students.

COBOL Turns 60: Why It Will Outlive Us All
From ACM News

COBOL Turns 60: Why It Will Outlive Us All

In the beginning, there was machine languages and assembler. Neither was easy to use, but then along came COBOL, and everything changed.

Developer Jobs: From SQL to Java, These are the Skills Companies are Looking for Now
From ACM TechNews

Developer Jobs: From SQL to Java, These are the Skills Companies are Looking for Now

More than 140,000 advertisements for IT jobs were listed in the U.K. in the second quarter of this year, 13% fewer than were listed in the first quarter

Mobile Malware Attacks are Booming in 2019: These are the Most Common Threats
From ACM TechNews

Mobile Malware Attacks are Booming in 2019: These are the Most Common Threats

Malware attacks against mobile devices, especially Android handsets, have ballooned this year.

Hackers Breach Greece's Top-Level Domain Registrar
From ACM TechNews

Hackers Breach Greece's Top-Level Domain Registrar

Researchers said Greece's top-level domain registrar has suffered a hacker breach, and identified the state-sponsored "Sea Turtle" hacker group as the perpetrator...

Neuromorphic Computing Finds New Life in Machine Learning
From ACM TechNews

Neuromorphic Computing Finds New Life in Machine Learning

Researchers are working to resolve the fact that spiking neurons currently have no way that they can be trained via gradient descent—the basis of conventional machine...

Google's Language Techniques Help O2 Czech Republic Reveal Network Secrets
From ACM TechNews

Google's Language Techniques Help O2 Czech Republic Reveal Network Secrets

Word2vec, a neural network technique developed to understand human languages, also can interpret raw cell tower data.

Python Predicted to Overtake C and Java in Next 4 Years
From ACM TechNews

Python Predicted to Overtake C and Java in Next 4 Years

Tiobe analysts believe Python probably will become the most popular programming language in the world within three or four years.

Machine Learning Sniffs Out Its Own Machine-Written Propaganda
From ACM TechNews

Machine Learning Sniffs Out Its Own Machine-Written Propaganda

Researchers have modified a neural network to create a natural language processing algorithm that generates, as well as detects, convincing fake articles.

Security Researchers Discover Linux Version of Winnti Malware
From ACM TechNews

Security Researchers Discover Linux Version of Winnti Malware

Security researchers have discovered a Linux version of Winnti, a malware used by Chinese government-sponsored hackers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account