acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectLegal Aspects
authorArs Technica
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Inspired By Brain's Visual Cortex, New AI ­tterly Wrecks Captcha Security
From ACM News

Inspired By Brain's Visual Cortex, New AI ­tterly Wrecks Captcha Security

Computer algorithms have gotten much better at recognizing patterns, like specific animals or people's faces, allowing software to automatically categorize large...

Serious Flaw in Wpa2 Protocol Lets Attackers Intercept Passwords and Much More
From ACM TechNews

Serious Flaw in Wpa2 Protocol Lets Attackers Intercept Passwords and Much More

Researchers have discovered a severe flaw in the WPA2 protocol that enables hackers within range of a vulnerable device or access point to intercept passwords and...

Infrared Signals in Surveillance Cameras Let Malware Jump Network Air Gaps
From ACM News

Infrared Signals in Surveillance Cameras Let Malware Jump Network Air Gaps

Researchers have devised malware that can jump airgaps by using the infrared capabilities of an infected network's surveillance cameras to transmit data to and...

With the Uss mccain Collision, Even Navy Tech Can't Overcome Human Shortcomings
From ACM News

With the Uss mccain Collision, Even Navy Tech Can't Overcome Human Shortcomings

In the darkness of early morning on August 21, the guided-missile destroyer USS John S. McCain collided with a tanker in the Strait of Malacca off Singapore.

New Web Tool Tracks Russian 'influence Ops' on Twitter
From ACM News

New Web Tool Tracks Russian 'influence Ops' on Twitter

The Alliance for Securing Democracy, a bipartisan project backed by the German Marshall Fund of the United States (GMF), has launched a Web tool to keep tabs on...

Concerned About Connected Car Privacy? Bluetooth Sensors Used to Track Traffic
From ACM News

Concerned About Connected Car Privacy? Bluetooth Sensors Used to Track Traffic

One big promise of the connected car revolution has been the potential to help clear up traffic problems.

'internet of Ships' Tells Tale of ­ss Fitzgerald Tragedy, Or Half of It
From ACM News

'internet of Ships' Tells Tale of ­ss Fitzgerald Tragedy, Or Half of It

On early Saturday morning off the coast of Japan, the Philippines-flagged cargo container carrierACX Crystal struck the USS Fitzgerald (DDG-62) on its starboard...

How a Few Yellow Dots Burned the Intercept's Nsa Leaker
From ACM News

How a Few Yellow Dots Burned the Intercept's Nsa Leaker

When reporters at The Intercept approached the National Security Agency on June 1 to confirm a document that had been anonymously leaked to the publication in May...

Leaked Nsa Report Says Russians Tried to Hack State Election Officials
From ACM News

Leaked Nsa Report Says Russians Tried to Hack State Election Officials

A Top Secret NSA analyst's report published by The Intercept suggests that, in August 2016, the Russian General Main Staff Intelligence Directorate (GRU) hacked...

Got a Face-Recognition Algorithm? ­ncle Sam Wants to Review It
From ACM News

Got a Face-Recognition Algorithm? ­ncle Sam Wants to Review It

The nation's top-level intelligence office, the Director of National Intelligence, wants to find "the most accurate unconstrained face recognition algorithm."

'we All Love the Tomahawk:' A Brief History of ­.s.'s Favorite Robotic Killer
From ACM News

'we All Love the Tomahawk:' A Brief History of ­.s.'s Favorite Robotic Killer

In the early hours of Friday morning, two U.S. Navy guided-missile destroyers in the waters of the eastern Mediterranean Sea launched a barrage of Tomahawk Land...

For Sale: Your Private Browsing History
From ACM News

For Sale: Your Private Browsing History

The US House of Representatives voted Tuesday to eliminate ISP privacy rules, following the Senate vote to take the same action last week. The legislation to kill...

To Keep Tor Hack Source Code Secret, Doj Dismisses Child Porn Case
From ACM News

To Keep Tor Hack Source Code Secret, Doj Dismisses Child Porn Case

Rather than share the now-classified technological means that investigators used to locate a child porn suspect, federal prosecutors in Washington state have ...

In Not-Too-Distant Future, Brain Hackers Could Steal Your Deepest Secrets
From ACM News

In Not-Too-Distant Future, Brain Hackers Could Steal Your Deepest Secrets

In the beginning, people hacked phones.

Hackers Trigger Yet Another Power Outage in Ukraine
From ACM News

Hackers Trigger Yet Another Power Outage in Ukraine


Did the Russians 'hack' the Election? A Look at the Established Facts
From ACM News

Did the Russians 'hack' the Election? A Look at the Established Facts

President-elect Donald Trump continues to discount or attempt to discredit reports that the intelligence community has linked the hacking of the DNC, the Hillary...

Google Warns Journalists and Professors: Your Account Is ­nder Attack
From ACM News

Google Warns Journalists and Professors: Your Account Is ­nder Attack

A flurry of social media reports suggests a major hacking campaign has been uncovered.

Internet-Based and Open Source: How E-Voting Works Around the Globe
From ACM TechNews

Internet-Based and Open Source: How E-Voting Works Around the Globe

Although electronic voting in various forms has become more prevalent outside the U.S., its primary difficulties include its inability to verify source code and...

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping
From ACM TechNews

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping

Google Brain researchers say they have developed artificial intelligence technology that can form encryptions and communicate securely.

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping
From ACM News

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping

Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect their messages from a third AI, which was trying...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account