acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hackers Can Be Battlefield Targets, Says Nato Report
From ACM TechNews

Hackers Can Be Battlefield Targets, Says Nato Report

NATO's cyberwarfare handbook says that civilian hackers who carry out cyberattacks during coordinated military campaigns can be targeted as combatants. 

Domestic Drones Stir Imaginations, and Concerns
From ACM News

Domestic Drones Stir Imaginations, and Concerns

On the pilot's computer screen, planted at ground level a few yards from the airport runway here, the data streaming across the display tracked an airplane at 1...

Revealed: The 1962 CIA Paper That Predicts the Big Deal With Big Data
From ACM News

Revealed: The 1962 CIA Paper That Predicts the Big Deal With Big Data

The Central Intelligence Agency has published for the first time "Some Far-Out Thoughts on Computers," a 1962 internal document that shows how eager the agency...

Hacking Highlights Dangers to Seoul of North's Cyber-Warriors
From ACM News

Hacking Highlights Dangers to Seoul of North's Cyber-Warriors

A hacking attack that brought down three South Korean broadcasters and two major banks has been identified by most commentators as North Korea flexing its muscles...

Cyberwar Manual Lays Down Rules For Online Attacks
From ACM News

Cyberwar Manual Lays Down Rules For Online Attacks

Even cyberwar has rules, and one group of experts is putting out a manual to prove it.

When 'likes' Can Shed Light
From ACM News

When 'likes' Can Shed Light

Patterns of "Likes" posted by people on Facebook can unintentionally expose their political and religious views, drug use, divorce, and sexual orientation, researchers...

Mind Plus Machine
From ACM News

Mind Plus Machine

Behind a locked door in a white-walled basement in a research building in Tempe, Ariz., a monkey sits stone-still in a chair, eyes locked on a computer screen.

U.s. Drones Fail to Identify Blind Spots of Iran's Radar Systems
From ACM News

U.s. Drones Fail to Identify Blind Spots of Iran's Radar Systems

A senior Iranian lawmaker lauded the country's Armed Forces for their vigilance and ability in discovering and repelling enemy aggressions, and said the US intended...

Cyberattack on Florida Election Is First Known Case in U.s., Experts Say
From ACM News

Cyberattack on Florida Election Is First Known Case in U.s., Experts Say

An attempt to illegally obtain absentee ballots in Florida last year is the first known case in the U.S. of a cyberattack against an online election system, according...

National Security Letters Are Unconstitutional, Federal Judge Rules
From ACM News

National Security Letters Are Unconstitutional, Federal Judge Rules

A federal district court judge in San Francisco has ruled that National Security Letter (NSL) provisions in federal law violate the Constitution. The decision came...

Israel Ramps ­p Its Cyberdefense Training
From ACM Careers

Israel Ramps ­p Its Cyberdefense Training

Twice a week about 200 Israeli high school students in seven separate locations meet after school for six hours of extra classes.

Google Wants to Replace Your Passwords With a Ring
From ACM TechNews

Google Wants to Replace Your Passwords With a Ring

Google has developed rings designed to be worn on the finger that provide security for logging into a computer or an online account.

Steganography Is No Laughing Matter
From ACM TechNews

Steganography Is No Laughing Matter

A computer scientist has developed an approach to steganography that uses jokes to make hidden messages less obvious. 

Researchers Find 25 Countries Using Surveillance Software
From ACM TechNews

Researchers Find 25 Countries Using Surveillance Software

As many as 25 governments, some with controversial human rights records, appear to engage in surveillance of citizens using off-the-shelf software.

Cryptographers Demonstrate New Crack For Common Web Encryption
From ACM News

Cryptographers Demonstrate New Crack For Common Web Encryption

It's long been known that one of the oldest and most widely used standards for encrypting Web sites has some serious weaknesses. But one group of researchers has...

U.s. Security Chief Warns of Rising Cyber Threats
From ACM TechNews

U.s. Security Chief Warns of Rising Cyber Threats

Cyberattacks represent the greatest threat to U.S. security, according to a new report by Director of National Intelligence James Clapper.

Peter G. Neumann: Top Cop on the Hair-Raising Cybersecurity Beat
From ACM Opinion

Peter G. Neumann: Top Cop on the Hair-Raising Cybersecurity Beat

The threat is always there—in your car, at the office, on the table next to where you sleep at night: a near-biblical plague of worms, phisher kings, identity thieves...

Pentagon Creating Teams to Launch Cyberattacks as Threat Grows
From ACM News

Pentagon Creating Teams to Launch Cyberattacks as Threat Grows

The Pentagon's Cyber Command will create 13 offensive teams by the fall of 2015 to help defend the nation against major computer attacks from abroad, Gen. Keith...

Google Concedes That Drive-By Prying Violated Privacy
From ACM News

Google Concedes That Drive-By Prying Violated Privacy

Google on Tuesday acknowledged to state officials that it had violated people's privacy during its Street View mapping project when it casually scooped up passwords...

Clues Suggest Malware Is Moving from Pcs to Mobile Devices
From ACM News

Clues Suggest Malware Is Moving from Pcs to Mobile Devices

The fact that smartphones and tablets don't need antivirus software or regular software updates is a major reason for their popularity.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account