acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


A Blueprint to Stop Browser Attacks
From ACM TechNews

A Blueprint to Stop Browser Attacks

University of Illinois at Chicago (UIC) researchers will present a new way of defending against cross-site scripting attacks at the upcoming IEEE Symposium on Security...

From ACM TechNews

Is the ­U.S. Ready For Government-Sponsored Cyberattacks?

A recently published report from the National Research Council (NRC) contends that there has to be more public disclosure and informed debate about cyberarms and...

China Develops Quantum Cryptography Network
From ACM TechNews

China Develops Quantum Cryptography Network

Researchers at the University of Science and Technology of China say they have developed the first optical quantum cryptography network. The quantum communication...

Tracking Cyberspies Through the Web Wilderness
From ACM TechNews

Tracking Cyberspies Through the Web Wilderness

The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...

Mathematical Advances Strengthen It Security
From ACM TechNews

Mathematical Advances Strengthen It Security

A new cryptography approach based on the mathematical theory of elliptic curves is considered a leading candidate to replace the widely used RSA public key security...

From ACM News

'kill Switch' Disables Stolen Laptops

A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...

From ACM News

China Has Developed Its Own Operating System For Cyber War With U.S.

A leading cyber security specialist said last week that China has developed its own ultra-secure operating system for a strategic edge in its cyber warfare with...

Professor Wants Exemption to Study Video Game Anti-Piracy Software
From ACM TechNews

Professor Wants Exemption to Study Video Game Anti-Piracy Software

University of Michigan professor Alex Halderman wants to research whether the anti-piracy software built into computer games makes computers more vulnerable to...

From ACM Careers

Students Excel in New-Age Crime Technology

Hacking has become an attractive subject for many students. The first day of the Security and Identity Management (SIM) conference in Ahmedabad saw paper presentations...

Cadets Trade the Trenches For Firewalls
From ACM TechNews

Cadets Trade the Trenches For Firewalls

Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...

From ACM News

Hackers Attack ­c Berkeley Databases

The University of California, Berkeley, began notifying students, alumni and others on Friday (May 8) that their personal information may have been stolen after...

From ACM TechNews

Researchers Take Over Dangerous Botnet

University of California-Santa Barbara (UCSB) researchers temporarily commandeered an infamous botnet known for stealing financial data and found that the threat...

From ACM TechNews

Faa's Air-Traffic Networks Breached By Hackers

The U.S. Transportation Department's inspector general released a report on May 6 that said the U.S.'s civilian air-traffic computer networks had been breached...

From ACM TechNews

Cyber-Command May Help Protect Civilian Networks

The U.S. Pentagon is considering establishing a new cyber-command to oversee government efforts to protect military computer networks and to assist in protecting...

Nist Requests Comments on Automated Computer Security Spec
From ACM News

Nist Requests Comments on Automated Computer Security Spec

The National Institute of Standards and Technology (NIST), an agency of the U.S. Department of Commerce, has issued for public comment a draft publication describing...

How Hackers Can Steal Secrets From Reflections
From ACM TechNews

How Hackers Can Steal Secrets From Reflections

Even the best electronic security may not be enough to protect sensitive data from dogged hackers, and researchers have been able to extract information from the...

­nmasking Social-Network ­sers
From ACM TechNews

­nmasking Social-Network ­sers

University of Texas at Austin researchers have found that, combined with readily available data from other online sources, social network data can reveal sensitive...

Quantum Cryptography: Hackers' R.i.p.?
From ACM TechNews

Quantum Cryptography: Hackers' R.i.p.?

Researchers from Toshiba and Cambridge University's Cavendish Laboratory say secure quantum communication is possible with practical components for high-speed photon...

Software: The Eternal Battlefield in the Unending Cyberwars
From ACM TechNews

Software: The Eternal Battlefield in the Unending Cyberwars

Cybercriminals still have the upper hand on the Internet despite nearly two decades of technological advancement, and Carnegie Mellon University professor William...

Iranians and Others Outwit Net Censors
From ACM TechNews

Iranians and Others Outwit Net Censors

People around the world are circumventing their governments' censorship of Web content using tools developed and provided by a diverse coalition of political and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account