acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectLegal Aspects
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Malware Lets a Drone Steal Data By Watching a Computer's Blinking Led
From ACM News

Malware Lets a Drone Steal Data By Watching a Computer's Blinking Led

A few hours after dark one evening earlier this month, a small quadcopter drone lifted off from the parking lot of Ben-Gurion University in Beersheba, Israel.

A Chip Flaw Strips Away Hacking Protections For Millions of Devices
From ACM TechNews

A Chip Flaw Strips Away Hacking Protections For Millions of Devices

The VUSec team at the Free University of Amsterdam in the Netherlands has demonstrated an exploit that undercuts a basic safeguard used in all modern operating...

For the Next Election, Don't Recount the Vote. Encrypt It
From ACM News

For the Next Election, Don't Recount the Vote. Encrypt It

Let's be honest: The 2016 election wasn’t a sterling display of American democracy.

Monero, the Drug Dealer's Cryptocurrency of Choice, Is on Fire
From ACM News

Monero, the Drug Dealer's Cryptocurrency of Choice, Is on Fire

For the cryptocurrency community, 2016 was a very good year.

The Year Encryption Won
From ACM News

The Year Encryption Won

Between the revelations of mega-hacks of Yahoo and others, Russia's meddling in the US electoral system, and the recent spike in ransomware, it's easy to look at...

Europe Is Leading the Way in AI and Machine Learning (and Even Silicon Valley Wants In)
From ACM TechNews

Europe Is Leading the Way in AI and Machine Learning (and Even Silicon Valley Wants In)

Europe is either ahead of or on equal footing with the U.S. in terms of artificial intelligence, machine learning, and other technologies.

How Humans Can Force the Machines to Play Fair
From ACM News

How Humans Can Force the Machines to Play Fair

Cynthia Dwork is best known for inventing "differential privacy," a set of techniques that safeguard the privacy of individuals in a large database.

Great. Now Even Your Headphones Can Spy on You
From ACM News

Great. Now Even Your Headphones Can Spy on You

Cautious computer users put a piece of tape over their webcam.

How to Block the Ultrasonic Signals You Didn't Know Were Tracking You
From ACM News

How to Block the Ultrasonic Signals You Didn't Know Were Tracking You

Dystopian corporte surveillance threats today come at us from all directions. Companies offer "always-on" devices that listen for our voice commands, and marketers...

Inside Darpa's Plan to Make Old Aircraft Autonomous With Robot Arms
From ACM News

Inside Darpa's Plan to Make Old Aircraft Autonomous With Robot Arms

There's a reason Tesla and its competitors use the term "autopilot" for their semi-autonomous cars: Aviation is way ahead of the auto industry when it comes to...

Your Dvr Didn't Take Down the Internet, Yet
From ACM News

Your Dvr Didn't Take Down the Internet, Yet

Last week ended with a mid-level internet catastrophe. You may have noticed that for most of Friday popular sites like Netflix, Twitter, Spotify (and yes, WIRED)...

Want to Know Julian Assange's Endgame? He Told You a Decade Ago
From ACM News

Want to Know Julian Assange's Endgame? He Told You a Decade Ago

Amid a seemingly incessant deluge of leaks and hacks, Washington, DC staffers have learned to imagine how even the most benign email would look a week later on...

How to Steal an AI
From ACM News

How to Steal an AI

In the burgeoning field of computer science known as machine learning, engineers often refer to the artificial intelligences they create as "black box" systems:...

How Police Trace Cellphones in Ieds Like the Ones in Nyc
From ACM News

How Police Trace Cellphones in Ieds Like the Ones in Nyc

A cellphone makes a convenient detonator for an improvised explosive device. But it's also one of the most conveniently trackable devices under the eye of American...

How the Fbi Could Have Hacked the San Bernardino Shooter's Iphone
From ACM News

How the Fbi Could Have Hacked the San Bernardino Shooter's Iphone

More than six months have passed since the FBI first ordered Apple to help the agency bypass the encryption on the iPhone 5c of Rizwan Syed Farook, an ISIS supporter...

AI Can Recognize Your Face Even If You're Pixelated
From ACM News

AI Can Recognize Your Face Even If You're Pixelated

Pixelation has long been a familiar fig leaf to cover our visual media’s most private parts.

Google's Clever Plan to Stop Aspiring Isis Recruits
From ACM News

Google's Clever Plan to Stop Aspiring Isis Recruits

Google has built a half-trillion-dollar business out of divining what people want based on a few words they type into a search field.

The Shadow Brokers Mess Is What Happens When the Nsa Hoards Zero-Days
From ACM News

The Shadow Brokers Mess Is What Happens When the Nsa Hoards Zero-Days

When the NSA discovers a new method of hacking into a piece of software or hardware, it faces a dilemma.

Ironic Windows Vulnerability Shows Why Backdoors Can't Work
From ACM News

Ironic Windows Vulnerability Shows Why Backdoors Can't Work

Apple's refusal to comply with a court order to help the FBI crack an iPhone highlighted the pressure tech companies face to include backdoors in their software...

A New Wireless Hack Can Unlock 100 Million Volkswagens
From ACM News

A New Wireless Hack Can Unlock 100 Million Volkswagens

In 2013, when University of Birmingham computer scientist Flavio Garcia and a team of researchers were preparing to reveal a vulnerability that allowed them todelayed...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account