acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


 FTC Investigating Whether ChatGPT Harms Consumers
From ACM News

FTC Investigating Whether ChatGPT Harms Consumers

The agency's demand for OpenAI's documents about AI risks mark the company's greatest U.S. regulatory threat to date.

As Businesses Clamor for Workplace A.I., Tech Companies Rush to Provide It
From ACM News

As Businesses Clamor for Workplace A.I., Tech Companies Rush to Provide It

Amazon, Box, Salesforce, Oracle, and others have recently rolled out A.I.-related products to help workplaces become more efficient and productive.

How Easy Is It to Fool A.I.-Detection Tools?
From ACM News

How Easy Is It to Fool A.I.-Detection Tools?

The detectors ignore all context clues, so they don't process the existence of a lifelike automaton in a photo with Mr. Musk as unlikely.

Meta Loses as Top EU Court backs Antitrust Regulators over Privacy Breach Checks
From ACM News

Meta Loses as Top EU Court backs Antitrust Regulators over Privacy Breach Checks

Meta harvests user data for behavioral advertising, a business model common to Big Tech.

Barred from Grocery Stores by Facial Recognition
From ACM TechNews

Barred from Grocery Stores by Facial Recognition

The use of facial recognition by private businesses in the U.K. is on the rise.

Biden Administration Weighs Further Curbs on Sales of A.I. Chips to China
From ACM News

Biden Administration Weighs Further Curbs on Sales of A.I. Chips to China

Reports that the White House may clamp down on sales of semiconductors that power artificial intelligence capabilities sent tech stocks diving.

A Bridge Between Different Cryptocurrencies
From ACM TechNews

A Bridge Between Different Cryptocurrencies

A decentralized protocol could allow for the efficient, secure exchange of one cryptocurrency for another.

How Secure Are Voice Authentication Systems?
From ACM TechNews

How Secure Are Voice Authentication Systems?

Computer scientists have developed an attack that can bypass voice authentication security systems within six attempts.

Junk Websites Filled with AI-Generated Text are Pulling In Money from Programmatic Ads
From ACM News

Junk Websites Filled with AI-Generated Text are Pulling In Money from Programmatic Ads

More than 140 brands are advertising on low-quality content farm sites—and the problem is growing fast.

The Race to Prevent 'the Worst Case Scenario for Machine Learning'
From ACM News

The Race to Prevent 'the Worst Case Scenario for Machine Learning'

A.I. companies have an edge in blocking the creation and distribution of child sexual abuse material. They've seen how social media companies failed.

After Twitter
From ACM News

After Twitter

New social apps arise to challenge troubled Twitter.

Google Backs Creation of Cybersecurity Clinics with $20-Million Donation
From ACM TechNews

Google Backs Creation of Cybersecurity Clinics with $20-Million Donation

Google CEO Sundar Pichai pledged $20 million to support and expand the Consortium of Cybersecurity Clinics.

Accelerating Optical Communications with AI
From Communications of the ACM

Accelerating Optical Communications with AI

Communications efficiency helps bring photonics to artificial intelligence.

The Rise of the Chatbots
From Communications of the ACM

The Rise of the Chatbots

How do we keep track of the truth when bots are becoming increasingly skilled liars?

Outsmarting Deepfake Video
From Communications of the ACM

Outsmarting Deepfake Video

Looking for truth, when "it's becoming surprisingly easy to distort reality."

Keeping Hackers Off the Electrical Grid
From ACM News

Keeping Hackers Off the Electrical Grid

Protecting electrical power delivery networks from incursions.

Food Producers Band Together in Face of Cyber Threats
From ACM TechNews

Food Producers Band Together in Face of Cyber Threats

Executives of U.S. food and agriculture companies say they are collaboratively formalizing information-sharing to fortify themselves against escalating cybersecurity...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account