acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectCommunications / Networking
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells
From ACM News

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells

Vulnerabilities in electronic systems that control prison doors could allow hackers or others to spring prisoners from their jail cells, according to researchers...

From ACM News

Stanford

What better way to combine your nerdy loves of computer programming and Star Wars than with a robot that can actually battle with a light saber?

From ACM News

DARPA Searches For Life

There’s a hidden clock that underlies every process of every living thing—from when our cells start dividing to how quickly we age. Researchers at Darpa, the...

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History
From ACM News

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

It was January 2010, and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz...

From ACM News

Spies Want to Mine Your Tweets For Signs of the Next Tsunami

The intelligence community has seen the future, and the future is Google Trends. Actually, more like a highly sophisticated version of Google Trends, with Twitter...

From ACM News

DARPA Crowdsources Interstellar Travel

Last August, a bunch of Star Wars fans pestered NASA about a timetable for building a hyperdrive engine. Maybe someone was listening. In May, the Defense Advanced...

How to Make a Clock Run For 10,000 Years
From ACM News

How to Make a Clock Run For 10,000 Years

High on a rocky ridge in the desert, nestled among 5,000-year-old bristlecone pines, is the topmost part of a clock that has been ticking for thousands of years...

Army Seeks Social Media Gurus to Save Afghan War
From ACM News

Army Seeks Social Media Gurus to Save Afghan War

Know how to Tweet? Or how to put words into the mouths of foreign security functionaries? If so, the U.S. Army wants you to help un-quagmire the Afghanistan war...

One Brain, Hundreds of Eyes: DARPA Plots Manhunt Master Controller
From ACM News

One Brain, Hundreds of Eyes: DARPA Plots Manhunt Master Controller

Thought military tracking technology couldn’t get any creepier? Hold onto your tinfoil hats and hide behind the nearest curtain because the next generation of...

Bill Would Keep Big Brother's Mitts Off Your Gps Data
From ACM News

Bill Would Keep Big Brother's Mitts Off Your Gps Data

The reauthorization of the Patriot Act looks like a forgone conclusion. But next month, a bipartisan band of legislators will try to mitigate a different kind...

Crazy Military Tracking Tech, From Super Scents to Quantum Dots
From ACM News

Crazy Military Tracking Tech, From Super Scents to Quantum Dots

Scents that make you trackable, indoors and out. Nanocrystals that stick to your body, and light up on night-vision goggles. Miniradar that maps your location...

Bin Laden Compound Now a Virtual Training Ground for Commandos
From ACM News

Bin Laden Compound Now a Virtual Training Ground for Commandos

To passers-by, T.J., a fit 20-something, is running around a red felt carpet about half the size of a basketball court inside a convention center. In his mind...

Why Google Does Not Own Skype
From ACM Opinion

Why Google Does Not Own Skype

So Microsoft is buying Skype for $8.5 billion, its biggest deal ever. It’s too soon to make a pronouncement on whether the purchase is an idiot move, a brilliant...

From ACM News

Domestic Surveillance Court Approved All 1,506 Warrant Applications in 2010

The secretive Foreign Intelligence Surveillance Court approved all 1,506 government requests to electronically monitor suspected "agents" of a foreign power or...

From ACM News

Darpa Apes Nick Fury to Map Social Networks

If the military is going to disrupt insurgent cells or understand how revolutionary movements congeal, it needs to perceive the connections between people that...

May 5, 1992: Wolfenstein 3-D Shoots First-Person Shooter Into Stardom
From ACM News

May 5, 1992: Wolfenstein 3-D Shoots First-Person Shooter Into Stardom

Id Software releases Wolfenstein 3-D, launching a huge computer-game category.

Hoops 2.0: Inside the Nba
From ACM News

Hoops 2.0: Inside the Nba

Outside Oracle Arena, it’s a balmy 65-degree spring day. But up in the building’s rafters, 80-odd feet above the hardwood floor, the air is crisp and the view...

Why Cisco's Flip Flopped in the Camera Business
From ACM News

Why Cisco's Flip Flopped in the Camera Business

Cisco is shutting down a business unit that it bought for over half-a-billion dollars: the Flip camcorder division. That's a shame, considering how high the Flip...

Military
From ACM News

Military

The Pentagon has spent decades and gazillions of dollars trying to build the perfect translation device. Now, its far-out research arm is looking at a new direction...

Attack Code for SCADA Vulnerabilities Released Online
From ACM News

Attack Code for SCADA Vulnerabilities Released Online

The security of critical infrastructure is in the spotlight again this week after a researcher released attack code that can exploit several vulnerabilities found...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account