acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Web Security Tool Copies Apps' Moves
From ACM TechNews

Web Security Tool Copies Apps' Moves

Scientists at Microsoft research have unveiled Ripley, a new way to secure complex Web applications by effectively cloning the user's browser and running it remotely...

From ACM News

Terrorism in the Age of Technology: Biothreats And?cyber Warfare

While once considered unconventional, cyber attacks and biological warfare have become an increasing threat to security and a tactic of rising concern. Spanning...

Rutgers Computer Scientists Work to Strengthen Online Security
From ACM TechNews

Rutgers Computer Scientists Work to Strengthen Online Security

Rutgers University computer scientists are developing an alternative to online security questions that is designed to be easier for legitimate users and more secure...

Grant Will Improve Mobile Device, Cellular Network Security
From ACM News

Grant Will Improve Mobile Device, Cellular Network Security

Smart phones have become indispensable to today's highly mobile workforce and tech-savvy youngsters, but they pose new security and privacy risks. Two assistant...

Is Aes Encryption Crackable?
From ACM TechNews

Is Aes Encryption Crackable?

The Advanced Encryption Standard (AES) system was long believed to be invulnerable to attack, but a group of researchers recently demonstrated that there may be...

The Explainer: P vs. Np
From ACM TechNews

The Explainer: P vs. Np

The Clay Mathematics Institute has a standing offer of $1 million for anyone who is able to prove or disprove one of seven problems that have never been solved....

Nist Test Proves 'the Eyes Have It' For Id Verification
From ACM News

Nist Test Proves 'the Eyes Have It' For Id Verification

The intricate structure of the iris constitutes a powerful biometric. A new report from the National Institute of Standards and Technology (NIST) demonstrates that...

Social Networking Meets Ambient Intelligence
From ICT Results

Social Networking Meets Ambient Intelligence

Sharing small snippets of information about your daily life is a key feature of the online social networking revolution. Soon status updates and other social information...

­.s. Cyber War Policy Needs New Focus, Experts Say
From ACM TechNews

­.s. Cyber War Policy Needs New Focus, Experts Say

Three cybersecurity experts recently told a meeting of the Congressional Cyber Caucus that current U.S. policies for protecting the United States against various...

From ACM TechNews

Software That Fixes Itself

Massachusetts Institute of Technology researchers led by professor Martin Rinard have developed ClearView, software capable of finding and fixing certain types...

Bogus E-Mails From Fdic Link Computer ­sers to Viruses, Expert Says
From ACM TechNews

Bogus E-Mails From Fdic Link Computer ­sers to Viruses, Expert Says

Computer forensics researchers at the University of Alabama at Birmingham (UAB) have been tracking new spam that claims to come from the U.S. Federal Deposit Insurance...

From ACM TechNews

Eavesdropping on Smartphone Secrets

Security researchers at Cryptography Research say the smart card attack involving differential power analysis could be used to target smartphones. Cryptography...

Internet Set For Change With Non-English Addresses
From ACM TechNews

Internet Set For Change With Non-English Addresses

Internationalized domain names (IDNs) will be one of the central topics at ICANN’s 36th International Public Meeting, which takes place October 25-30 in Seoul,...

Scan of Internet ­ncovers Thousands of Vulnerable Embedded Devices
From ACM TechNews

Scan of Internet ­ncovers Thousands of Vulnerable Embedded Devices

A scan of the Internet by Columbia University researchers searching for vulnerable embedded devices has found that nearly 21,000 routers, Webcams, and VoIP products...

Smartphone Security Threats Likely to Rise
From ACM News

Smartphone Security Threats Likely to Rise

Internet security experts say that worms, spam, viruses and hackers could be well on their way into your smartphone, whose rising popularity makes them sweeter...

From ACM TechNews

To Protect Your Privacy, Hand Over Your Data

A new proposal from the Massachusetts Institute of Technology's (MIT's) Human Dynamics Laboratory suggests that digital identities would be more secure if they...

From ACM TechNews

Vulnerability Seen in Amazon's Cloud-Computing

A new study by researchers from the Massachusetts Institute of Technology (MIT) and the University of California, San Diego (UCSD) suggests that leading cloud-computing...

Researchers Help Ensure Security of Military Logistics
From ACM TechNews

Researchers Help Ensure Security of Military Logistics

University of Texas at Dallas (UTD) professor Bhavani Thuraisingham, director of UTD's CyberSecurity Research Center, believes it is possible to establish data...

Exploring New Frontiers
From Communications of the ACM

Exploring New Frontiers

The Expeditions in Computing program provides scientists with the funding to work on ambitious, often multidisciplinary research.

From ACM News

First Gordon Prize in Managing Cybersecurity Resources Awarded

The first $1,000 Gordon Prize in Managing Cybersecurity Resources goes for an essay written by researchers from Harvard and Dresden, Germany. Maryland's Robert...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account