acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Dell Laptops and Computers Vulnerable to Remote Hijacks
From ACM TechNews

Dell Laptops and Computers Vulnerable to Remote Hijacks

Dell laptops and personal computers can be remotely commandeered via a vulnerability in the Dell SupportAssist utility.

Could TypeScript Replace JavaScript? ­Use of Programming Language Spin-Off Soars
From ACM TechNews

Could TypeScript Replace JavaScript? ­Use of Programming Language Spin-Off Soars

In a recent survey of developers who use npm, 62% of respondents said they used Microsoft's TypeScript to build native mobile and desktop apps, up from 46% in last...

Academics Hide Humans From Surveillance Cameras With 2D Prints
From ACM TechNews

Academics Hide Humans From Surveillance Cameras With 2D Prints

Researchers have developed a technique of using simple two-dimensional images to render wearers invisible to surveillance cameras.

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk
From ACM TechNews

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk

Researchers warn of the potential for unregulated aerial drones to threaten citizens.

Google Lookout ­ses AI to Describe Surroundings for Visually Impaired
From ACM TechNews

Google Lookout ­ses AI to Describe Surroundings for Visually Impaired

A new Google app uses artificial intelligence to help visually impaired users better perceive their surroundings by providing verbal feedback via smartphones.

­NSW, Sydney ­ni Join Quantum Powers to Prove Qubit Theory
From ACM TechNews

­NSW, Sydney ­ni Join Quantum Powers to Prove Qubit Theory

Researchers in Australia are combining their quantum computing powers, uniting methods designed by researchers at each university to prove their feasibility.

Study Shows Programmers Will Take the Easy Way Out and Not Implement Proper Password Security
From ACM TechNews

Study Shows Programmers Will Take the Easy Way Out and Not Implement Proper Password Security

Researchers have found that developers tend to write code that stores user passwords in an unsafe manner, because that is easier than creating a more secure product...

Cisco: Patch Routers Now Against Massive 9.8/10-Severity Security Hole
From ACM TechNews

Cisco: Patch Routers Now Against Massive 9.8/10-Severity Security Hole

Cisco has advised enterprise users of its wireless virtual private network and firewall routers to immediately install updates to patch a critical flaw.

Your Bionic Hand Is Now at Risk From Hackers
From ACM TechNews

Your Bionic Hand Is Now at Risk From Hackers

Kaspersky Lab researchers revealed at Mobile World Congress 2019 in Spain that bionic hand prostheses from Moscow-based Motorica are vulnerable to hacking.

Security Flaws Found in 26 Low-End Cryptocurrencies
From ACM TechNews

Security Flaws Found in 26 Low-End Cryptocurrencies

Researchers have discovered two security flaws that impact 26 Proof of Stake cryptocurrencies.

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes
From ACM TechNews

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes

Security researchers attending the Pwn2Own CanSecWest security conference this March in Vancouver, Canada, will be incentivized to hack a Tesla Model 3 car.

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change
From ACM TechNews

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change

The World Economic Forum has listed large-scale cyberattacks and massive data breaches among the five most probable risks facing the world today.

Tech Skills in Most Demand This Year: Data, Cloud, Cybersecurity
From ACM TechNews

Tech Skills in Most Demand This Year: Data, Cloud, Cybersecurity

A global recruiting firm predicts 68% of information technology employers will increase full-time IT hiring this year, while 53% will increase their use of consultants...

E­ to Fund Bug Bounty Programs for 14 Open Source Projects
From ACM TechNews

E­ to Fund Bug Bounty Programs for 14 Open Source Projects

The European Union will cover the costs of bug bounty programs for 14 open source projects.

RFID Tag Arrays Can Be ­sed to Track a Person's Movement
From ACM TechNews

RFID Tag Arrays Can Be ­sed to Track a Person's Movement

Radio-frequency identification tags may be used to track movement.

Hyundai Develops Fingerprint Tech to Unlock and Start Cars
From ACM TechNews

Hyundai Develops Fingerprint Tech to Unlock and Start Cars

Hyundai Motor has developed a system that will allow drivers to unlock and start their vehicles using only their fingerprints.

Nurse Robot Moxi Gets Schooled by Texas Nurses
From ACM TechNews

Nurse Robot Moxi Gets Schooled by Texas Nurses

A robot designed to test collaborative automation integration in a working medical facility recently concluded its first real-world trial in a Texas hospital.

Walmart Leads the Way...in Floor Scrubbing Robots?
From ACM TechNews

Walmart Leads the Way...in Floor Scrubbing Robots?

By the end of next month, Walmart will deploy floor-scrubbing robots in its stores.

Playing With Molecules in Virtual Reality
From ACM TechNews

Playing With Molecules in Virtual Reality

A growing number of companies are using virtual reality to enable scientists to view, design, and manipulate molecular structures.

­NSW Has Found a Way to Access Information Stored Within Atoms
From ACM TechNews

­NSW Has Found a Way to Access Information Stored Within Atoms

Researchers at the University of New South Wales in Australia have demonstrated a compact sensor for accessing information stored in the electrons of individual...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account