acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectLegal Aspects
authorArs Technica
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


To Keep Tor Hack Source Code Secret, Doj Dismisses Child Porn Case
From ACM News

To Keep Tor Hack Source Code Secret, Doj Dismisses Child Porn Case

Rather than share the now-classified technological means that investigators used to locate a child porn suspect, federal prosecutors in Washington state have ...

In Not-Too-Distant Future, Brain Hackers Could Steal Your Deepest Secrets
From ACM News

In Not-Too-Distant Future, Brain Hackers Could Steal Your Deepest Secrets

In the beginning, people hacked phones.

Hackers Trigger Yet Another Power Outage in Ukraine
From ACM News

Hackers Trigger Yet Another Power Outage in Ukraine


Did the Russians 'hack' the Election? A Look at the Established Facts
From ACM News

Did the Russians 'hack' the Election? A Look at the Established Facts

President-elect Donald Trump continues to discount or attempt to discredit reports that the intelligence community has linked the hacking of the DNC, the Hillary...

Google Warns Journalists and Professors: Your Account Is ­nder Attack
From ACM News

Google Warns Journalists and Professors: Your Account Is ­nder Attack

A flurry of social media reports suggests a major hacking campaign has been uncovered.

Internet-Based and Open Source: How E-Voting Works Around the Globe
From ACM TechNews

Internet-Based and Open Source: How E-Voting Works Around the Globe

Although electronic voting in various forms has become more prevalent outside the U.S., its primary difficulties include its inability to verify source code and...

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping
From ACM TechNews

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping

Google Brain researchers say they have developed artificial intelligence technology that can form encryptions and communicate securely.

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping
From ACM News

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping

Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect their messages from a third AI, which was trying...

The Perpetual Lineup: Half of ­S Adults in a Face-Recognition Database
From ACM News

The Perpetual Lineup: Half of ­S Adults in a Face-Recognition Database

Half of American adults are in a face-recognition database, according to a Georgetown University study released Tuesday.

Vr Started with Gaming, But It Will Take Over Every Other Industry
From ACM Careers

Vr Started with Gaming, But It Will Take Over Every Other Industry

"We are looking at sensory immersion.

Obama's Science Advisors: Much Forensic Work Has No Scientific Foundation
From ACM News

Obama's Science Advisors: Much Forensic Work Has No Scientific Foundation

Last year, the US Department of Justice released a report that involved some painful self-examination.

Building a New Tor that Can Resist Next-Generation State Surveillance
From ACM News

Building a New Tor that Can Resist Next-Generation State Surveillance

Since Edward Snowden stepped into the limelight from a hotel room in Hong Kong three years ago, use of the Tor anonymity network has grown massively.

So Much for Counter-Phishing Training: Half of People Click Anything Sent to Them
From ACM News

So Much for Counter-Phishing Training: Half of People Click Anything Sent to Them

Security experts often talk about the importance of educating people about the risks of "phishing" e-mails containing links to malicious websites. But sometimes...

Hints Suggest an Insider Helped the Nsa 'equation Group' Hacking Tools Leak
From ACM News

Hints Suggest an Insider Helped the Nsa 'equation Group' Hacking Tools Leak

A group called the Shadow Brokers made headlines this month by leaking a hacking tool belonging to the NSA's Tailored Access Operations (TAO) team. Now this week...

Fbi Chief Comey: 'we Have Never Had Absolute Privacy'
From ACM News

Fbi Chief Comey: 'we Have Never Had Absolute Privacy'

FBI Director James Comey has some phones—650 of them, to be exact—that he'd really, really like to take a look at.

Good News—the Robocalling Scourge May Not Be Unstoppable After All
From ACM News

Good News—the Robocalling Scourge May Not Be Unstoppable After All

New data shows that the majority of robot-enabled scam phone calls came from fewer than 40 call centers, a finding that offers hope the growing menace of robocalls...

Tour De France to ­se Thermal Imaging to Fight Mechanical Doping
From ACM News

Tour De France to ­se Thermal Imaging to Fight Mechanical Doping

They call it "mechanical doping," but the name simply doesn't do it justice.

Smile, You're in the Fbi Face-Recognition Database
From ACM News

Smile, You're in the Fbi Face-Recognition Database

The Federal Bureau of Investigation has access to as many as 411.9 million images as part of its face-recognition database. 

Red Astroturf: Chinese Government Makes Millions of Fake Social Media Posts
From ACM News

Red Astroturf: Chinese Government Makes Millions of Fake Social Media Posts

Data scientists at Harvard University have found that the government of the People's Republic of China generates an estimated 448 million fake social media posts...

As ­S Drops 'cyber Bombs,' Isis Retools Its Own Cyber Army
From ACM News

As ­S Drops 'cyber Bombs,' Isis Retools Its Own Cyber Army

The Islamic State has been deft in its use of the Internet as a communications tool.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account