acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Filtering Network Attacks With a 'netflix' Method

University of California, Irvine (UC Irvine) researchers have developed a new method for blacklisting spam, distributed denial-of-service attacks, worms, and other...

Lawmakers Strike New Tone With Proposed Cybersecurity Bill
From ACM TechNews

Lawmakers Strike New Tone With Proposed Cybersecurity Bill

The second draft of a U.S. Senate cybersecurity bill scales back language that would give the president the ability to shut down the Internet in an emergency....

From ACM News

Budget, Personnel Cutbacks Could Be a Cause of It Outages

When eBay Inc.'s PayPal unit suffered a worldwide outage early last month, Sailrite Enterprises Inc., a sailing supply company based in Churubusco, Ind., lost its...

Dhs Cybersecurity Chiefs Speak Out
From ACM TechNews

Dhs Cybersecurity Chiefs Speak Out

As federal agencies continue to brainstorm ways to effectively oversee cybersecurity, the U.S. Department of Homeland Security (DHS) is increasing its foothold...

Nsf Funds CM­ Interdisciplinary Doctoral Program in Privacy and Security
From ACM TechNews

Nsf Funds CM­ Interdisciplinary Doctoral Program in Privacy and Security

Carnegie Mellon University has received a five-year, $3 million grant from the National Science Foundation to launch a Ph.D. program in usable privacy and security...

From ACM News

Defying Experts, Rogue Computer Code Still Lurks

Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...

Online Social Networks Leak Personal Information to Third-Party Tracking Sites
From ACM TechNews

Online Social Networks Leak Personal Information to Third-Party Tracking Sites

A Worcester Polytechnic Institute (WPI) study by professor Craig Wills found that the practices of many popular social networking sites can make personal information...

Worldwide Battle Rages For Control of the Internet
From ACM TechNews

Worldwide Battle Rages For Control of the Internet

Governments in the Middle East and north Africa routinely block and censor Web sites to control political discussions, according to a new report on the region by...

Computer Science Meets Environmental Science
From Communications of the ACM

Computer Science Meets Environmental Science

Scientists share knowledge and seek collaborators at computational sustainability conference.

Facing an Age-Old Problem
From Communications of the ACM

Facing an Age-Old Problem

Researchers are addressing the computing challenges of older individuals, whose needs are different — and too often disregarded.

Medical Nanobots
From Communications of the ACM

Medical Nanobots

Researchers working in medical nanorobotics are creating technologies that could lead to novel health-care applications, such as new ways of accessing areas of...

Entering a Parallel Universe
From Communications of the ACM

Entering a Parallel Universe

The promise of parallel computing has run afoul of the harsh reality of Amdahl's Law, which puts a ceiling on the benefit of converting sequential code to parallel...

Competitions Aim to Create Interest in Cybersecurity
From ACM News

Competitions Aim to Create Interest in Cybersecurity

U.S. government, industry, and academia are using cybersecurity competitions to interest high school and college students about the career opportunities in cybersecurity...

Nist Reorganization Plan Would Shutter It Lab's Computer Security Division
From ACM TechNews

Nist Reorganization Plan Would Shutter It Lab's Computer Security Division

A proposed plan to reorganize the U.S. National Institute of Standards and Technology's (NIST's) IT Laboratory would close the Computer Security Division and distribute...

Making Android More Secure
From ACM TechNews

Making Android More Secure

Google developed a new approach to mobile phone security with its open source Android operating system. Android developer Rich Cannings says there must be a balance...

From ACM TechNews

Hackers Stole Ids For Attacks

Russian hackers stole U.S. identities and software tools for use in a cyberattack against Georgian government Web sites during the war between Russia and Georgia...

Internet 'Immune System' Could Block Viruses
From ACM TechNews

Internet 'Immune System' Could Block Viruses

A system that fights highly infectious computer viruses by embedding defense mechanisms in key parts of the Internet has been developed by University of North Carolina...

Napolitano: Cybersecurity Issues Remain ­nresolved
From ACM TechNews

Napolitano: Cybersecurity Issues Remain ­nresolved

U.S. Department of Homeland Security secretary Janet Napolitano recently affirmed that her staff is still weighing options about how best to assimilate the public...

Computer Scientists Take Over Electronic Voting Machine With New Programming Technique
From ACM TechNews

Computer Scientists Take Over Electronic Voting Machine With New Programming Technique

Computer scientists from the University of California, San Diego (UCSD), the University of Michigan, and Princeton University have demonstrated that a Sequoia electronic...

From ACM TechNews

How to Build Anonymity Into the Internet

At the 9th annual Privacy Enhancing Technologies Symposium, security researchers discussed alternatives to existing systems designed to help Internet users maintain...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account