acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Researchers Develop Anti-Counterfeiting Technology For Rfid Tags

Engineering researchers at the University of Arkansas have developed a unique and robust method to prevent cloning of passive radio frequency identification (RFID)...

Facebook Offers Poor Personal Data Protection
From ACM TechNews

Facebook Offers Poor Personal Data Protection

A study of Norwegian Internet users and social media found that people are willing to post their personal information on social media sites even when they are not...

Georgia Tech Launches Experimental Green It Initiative
From ACM News

Georgia Tech Launches Experimental Green It Initiative

The biggest challenge in computing today, some experts say, is not processing power, but power consumption. To help understand and reduce power consumption, the...

Improving Security With Face Recognition Technology
From ACM TechNews

Improving Security With Face Recognition Technology

University of Miami professor Mohamed Abdel-Mottaleb has developed a new way to improve the efficiency and accuracy of facial recognition technology. Abdel-Mottaleb...

From ACM News

Face-Recognition Technology May Be ­sed at Hong Kong Border Checks

Face-recognition technology might be used to screen the residents at Hong Kong border checkpoints, Hong Kong's Security Secretary Ambrose Lee said Thursday (Nov...

From ACM News

Secret Math of Fly Eyes Could Overhaul Robot Vision

By turning the brain cell activity underlying fly eyesight into mathematical equations, researchers have found an ultra-efficient method for pulling motion patterns...

From ACM News

Wi-Fi Certification Might Be Tweaked For Smart Grids

The Wi-Fi Alliance has formed a task group to determine what standards need to be modified to ensure Wi-Fi is the tool of choice for smart-grid applications. The...

What Happens When Good Robots Go 'bad'?
From ACM TechNews

What Happens When Good Robots Go 'bad'?

A study by University of Washington researchers led by doctoral student Tamara Denning calls attention to the possibility of household robots being hacked by malevolent...

Web Security Tool Copies Apps' Moves
From ACM TechNews

Web Security Tool Copies Apps' Moves

Scientists at Microsoft research have unveiled Ripley, a new way to secure complex Web applications by effectively cloning the user's browser and running it remotely...

From ACM News

Terrorism in the Age of Technology: Biothreats And?cyber Warfare

While once considered unconventional, cyber attacks and biological warfare have become an increasing threat to security and a tactic of rising concern. Spanning...

Rutgers Computer Scientists Work to Strengthen Online Security
From ACM TechNews

Rutgers Computer Scientists Work to Strengthen Online Security

Rutgers University computer scientists are developing an alternative to online security questions that is designed to be easier for legitimate users and more secure...

Grant Will Improve Mobile Device, Cellular Network Security
From ACM News

Grant Will Improve Mobile Device, Cellular Network Security

Smart phones have become indispensable to today's highly mobile workforce and tech-savvy youngsters, but they pose new security and privacy risks. Two assistant...

Is Aes Encryption Crackable?
From ACM TechNews

Is Aes Encryption Crackable?

The Advanced Encryption Standard (AES) system was long believed to be invulnerable to attack, but a group of researchers recently demonstrated that there may be...

The Explainer: P vs. Np
From ACM TechNews

The Explainer: P vs. Np

The Clay Mathematics Institute has a standing offer of $1 million for anyone who is able to prove or disprove one of seven problems that have never been solved....

Nist Test Proves 'the Eyes Have It' For Id Verification
From ACM News

Nist Test Proves 'the Eyes Have It' For Id Verification

The intricate structure of the iris constitutes a powerful biometric. A new report from the National Institute of Standards and Technology (NIST) demonstrates that...

Social Networking Meets Ambient Intelligence
From ICT Results

Social Networking Meets Ambient Intelligence

Sharing small snippets of information about your daily life is a key feature of the online social networking revolution. Soon status updates and other social information...

­.s. Cyber War Policy Needs New Focus, Experts Say
From ACM TechNews

­.s. Cyber War Policy Needs New Focus, Experts Say

Three cybersecurity experts recently told a meeting of the Congressional Cyber Caucus that current U.S. policies for protecting the United States against various...

From ACM TechNews

Software That Fixes Itself

Massachusetts Institute of Technology researchers led by professor Martin Rinard have developed ClearView, software capable of finding and fixing certain types...

Bogus E-Mails From Fdic Link Computer ­sers to Viruses, Expert Says
From ACM TechNews

Bogus E-Mails From Fdic Link Computer ­sers to Viruses, Expert Says

Computer forensics researchers at the University of Alabama at Birmingham (UAB) have been tracking new spam that claims to come from the U.S. Federal Deposit Insurance...

From ACM TechNews

Eavesdropping on Smartphone Secrets

Security researchers at Cryptography Research say the smart card attack involving differential power analysis could be used to target smartphones. Cryptography...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account