acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Stuxnet: Computer Worm Opens New Era of Warfare
From ACM News

Stuxnet: Computer Worm Opens New Era of Warfare

For the past few months now, the nation's top military, intelligence and law enforcement officials have been warning Congress and the country about a coming cyberattack...

Dot-Brand Explosion Will Shell-Shock Lazy Coders-ICANN
From ACM TechNews

Dot-Brand Explosion Will Shell-Shock Lazy Coders-ICANN

The Internet Corporation for Assigned Names and Numbers reports that software developers and Webmasters need to keep track of its new generic top-level domain program...

Number 1 on Army's Shopping List: Wireless Broadband
From ACM News

Number 1 on Army's Shopping List: Wireless Broadband

The most important element of the Army's effort to modernize itself doesn't shoot. You can't ride in it. You can't wear it for protection against homemade bombs...

Why the Security Industry Never Actually Makes ­s Secure
From ACM News

Why the Security Industry Never Actually Makes ­s Secure

Every year, security vendors gather at the RSA conference here to reaffirm their commitment to fencing out hackers and keeping data safe. And every year, corporate...

Behold the Cheetah Robot. The Singularity Is Nigh!
From ACM News

Behold the Cheetah Robot. The Singularity Is Nigh!

Big defense budgets during the aughts financed the deployment of thousands of robots, including unmanned aerial and underwater vehicles, to Iraq and Afghanistan...

Parkagent Seeks to Reduce Urban Traffic Congestion
From ACM News

Parkagent Seeks to Reduce Urban Traffic Congestion

Researchers in Israel and the Netherlands have teamed up to create PARKAGENT, a spatially explicit agent-based software model designed to assess and optimize urban...

The Little White Box That Can Hack Your Network
From ACM News

The Little White Box That Can Hack Your Network

When Jayson E. Street broke into the branch office of a national bank in May of last year, the branch manager could not have been more helpful.

Pushing the Boundaries of Artificial Intelligence
From ACM TechNews

Pushing the Boundaries of Artificial Intelligence

Boston University Neuromorphics Laboratory researchers are developing an artificial intelligence-based robotics technology that can sense, learn, and adapt.  

Here's The Best (and Prettiest) Way To See Exactly How You're Being Tracked Online
From ACM News

Here's The Best (and Prettiest) Way To See Exactly How You're Being Tracked Online

Firefox-browser provider Mozilla has released an awesome new tool for seeing how you're being tracked on the Web.

From ACM TechNews

Simulator Computes Evacuation Scenarios for Major Events

Technical University Munich researchers are leading the Interactive Pedestrian Simulation for Regional Evacuation project, which is developing emergency evacuation...

New Computers Respond to Students' Emotions, Boredom
From ACM TechNews

New Computers Respond to Students' Emotions, Boredom

University of Notre Dame researchers have developed AutoTutor and Affective AutoTutor, intelligent tutoring programs that model and respond to students' cognitive...

Stroustrup Reveals What's New in C++ 11
From ACM TechNews

Stroustrup Reveals What's New in C++ 11

Texas A&M University professor Bjarne Stroustrup recently spoke with InfoWorld's Paul Krill about the past, present, and future of C++, which was recently upgraded...

From ACM TechNews

Automated Stress Testing for Web 2.0 Applications Helps Web Developers Find Programming Errors

Saarland University researchers are developing methods for automating and systematically testing Web applications for malfunctions and security vulnerabilities....

From ACM News

I'm Being Followed: How Google

This morning, if you opened your browser and went to NYTimes.com, an amazing thing happened in the milliseconds between your click and when the news appeared on...

Et Tu, Google? Android Apps Can Also Secretly Copy Photos
From ACM News

Et Tu, Google? Android Apps Can Also Secretly Copy Photos

It's not just Apple. Photos are vulnerable on Android phones, too.

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says
From ACM News

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says

In the midst of an ongoing turf battle over how big a role the National Security Agency should play in securing the nation’s critical infrastructure, a Defense...

Despite Intrusions, Chances Of U.s.-China Cyberwar Are Small
From ACM News

Despite Intrusions, Chances Of U.s.-China Cyberwar Are Small

A panel of security and policy experts said that, despite dire warnings about the information warfare capabilities of China and other developing nations, the risk...

From ACM TechNews

Cryptographic Attack Highlights the Importance of Bug-Free Software

University of Bristol researchers have circumvented the security that OpenSSL should provide by targeting a bug in the software.  

For Impatient Web Users, an Eye Blink Is Just Too Long to Wait
From ACM News

For Impatient Web Users, an Eye Blink Is Just Too Long to Wait

Wait a second. No, that's too long.

From ACM News

How a Web Link Can Take Control of Your Phone

A chilling demonstration to a small, packed room at the RSA security conference showed how clicking a single bad Web link while using a phone running Google's Android...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account