acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectComputers And Society
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hackers Breach Greece's Top-Level Domain Registrar
From ACM TechNews

Hackers Breach Greece's Top-Level Domain Registrar

Researchers said Greece's top-level domain registrar has suffered a hacker breach, and identified the state-sponsored "Sea Turtle" hacker group as the perpetrator...

Neuromorphic Computing Finds New Life in Machine Learning
From ACM TechNews

Neuromorphic Computing Finds New Life in Machine Learning

Researchers are working to resolve the fact that spiking neurons currently have no way that they can be trained via gradient descent—the basis of conventional machine...

Google's Language Techniques Help O2 Czech Republic Reveal Network Secrets
From ACM TechNews

Google's Language Techniques Help O2 Czech Republic Reveal Network Secrets

Word2vec, a neural network technique developed to understand human languages, also can interpret raw cell tower data.

Petaflop Systems Dominate the Supercomputer Landscape
From ACM TechNews

Petaflop Systems Dominate the Supercomputer Landscape

For the first time, every entry in this year's TOP500 list delivers petaflop-level capabilities.

Python Predicted to Overtake C and Java in Next 4 Years
From ACM TechNews

Python Predicted to Overtake C and Java in Next 4 Years

Tiobe analysts believe Python probably will become the most popular programming language in the world within three or four years.

Machine Learning Sniffs Out Its Own Machine-Written Propaganda
From ACM TechNews

Machine Learning Sniffs Out Its Own Machine-Written Propaganda

Researchers have modified a neural network to create a natural language processing algorithm that generates, as well as detects, convincing fake articles.

Security Researchers Discover Linux Version of Winnti Malware
From ACM TechNews

Security Researchers Discover Linux Version of Winnti Malware

Security researchers have discovered a Linux version of Winnti, a malware used by Chinese government-sponsored hackers.

Dell Laptops and Computers Vulnerable to Remote Hijacks
From ACM TechNews

Dell Laptops and Computers Vulnerable to Remote Hijacks

Dell laptops and personal computers can be remotely commandeered via a vulnerability in the Dell SupportAssist utility.

Could TypeScript Replace JavaScript? ­Use of Programming Language Spin-Off Soars
From ACM TechNews

Could TypeScript Replace JavaScript? ­Use of Programming Language Spin-Off Soars

In a recent survey of developers who use npm, 62% of respondents said they used Microsoft's TypeScript to build native mobile and desktop apps, up from 46% in last...

Academics Hide Humans From Surveillance Cameras With 2D Prints
From ACM TechNews

Academics Hide Humans From Surveillance Cameras With 2D Prints

Researchers have developed a technique of using simple two-dimensional images to render wearers invisible to surveillance cameras.

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk
From ACM TechNews

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk

Researchers warn of the potential for unregulated aerial drones to threaten citizens.

Google Lookout ­ses AI to Describe Surroundings for Visually Impaired
From ACM TechNews

Google Lookout ­ses AI to Describe Surroundings for Visually Impaired

A new Google app uses artificial intelligence to help visually impaired users better perceive their surroundings by providing verbal feedback via smartphones.

­NSW, Sydney ­ni Join Quantum Powers to Prove Qubit Theory
From ACM TechNews

­NSW, Sydney ­ni Join Quantum Powers to Prove Qubit Theory

Researchers in Australia are combining their quantum computing powers, uniting methods designed by researchers at each university to prove their feasibility.

Study Shows Programmers Will Take the Easy Way Out and Not Implement Proper Password Security
From ACM TechNews

Study Shows Programmers Will Take the Easy Way Out and Not Implement Proper Password Security

Researchers have found that developers tend to write code that stores user passwords in an unsafe manner, because that is easier than creating a more secure product...

Cisco: Patch Routers Now Against Massive 9.8/10-Severity Security Hole
From ACM TechNews

Cisco: Patch Routers Now Against Massive 9.8/10-Severity Security Hole

Cisco has advised enterprise users of its wireless virtual private network and firewall routers to immediately install updates to patch a critical flaw.

Your Bionic Hand Is Now at Risk From Hackers
From ACM TechNews

Your Bionic Hand Is Now at Risk From Hackers

Kaspersky Lab researchers revealed at Mobile World Congress 2019 in Spain that bionic hand prostheses from Moscow-based Motorica are vulnerable to hacking.

Security Flaws Found in 26 Low-End Cryptocurrencies
From ACM TechNews

Security Flaws Found in 26 Low-End Cryptocurrencies

Researchers have discovered two security flaws that impact 26 Proof of Stake cryptocurrencies.

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes
From ACM TechNews

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes

Security researchers attending the Pwn2Own CanSecWest security conference this March in Vancouver, Canada, will be incentivized to hack a Tesla Model 3 car.

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change
From ACM TechNews

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change

The World Economic Forum has listed large-scale cyberattacks and massive data breaches among the five most probable risks facing the world today.

Tech Skills in Most Demand This Year: Data, Cloud, Cybersecurity
From ACM TechNews

Tech Skills in Most Demand This Year: Data, Cloud, Cybersecurity

A global recruiting firm predicts 68% of information technology employers will increase full-time IT hiring this year, while 53% will increase their use of consultants...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account