acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectCommunications / Networking
authorComputerworld
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Massive Botnet 'indestructible,' Say Researchers

A new and improved botnet that has infected more than four million PCs is "practically indestructible," security researchers say. "TDL-4," the name for both the...

Bin Laden's Villa Lacked Internet, Phone Service
From ACM News

Bin Laden's Villa Lacked Internet, Phone Service

The absence of Internet and telephone service at Osama bin Laden's $1 million hiding place helped tip off intelligence experts that the Al Qaeda leader was indeed...

From ACM News

Iranian General Accuses Siemens of Helping ­.s., Israel Build Stuxnet

An Iranian military commander Saturday accused the German electronics giant Siemens with helping U.S. and Israeli teams craft the Stuxnet worm that attacked his...

From ACM News

Big Data to Drive a Surveillance Society

As real-time and batch analytics evolve using big data processing engines such as Hadoop, corporations will be able to track our activities, habits, and locations...

Japan's Internet Largely Intact After Earthquake, Tsunami
From ACM TechNews

Japan's Internet Largely Intact After Earthquake, Tsunami

Japan's Internet infrastructure demonstrated surprising resilience in the face of the recent earthquake and tsunami, as most Web sites remain in operation and the...

From ACM TechNews

Intel Says Light Peak Interconnect Technology Is Ready

Intel's high-speed Light Peak interconnect technology, which links PCs to displays and external storage devices, is ready for implementation, says Intel's David...

From ACM News

White House Says Supercomputing 'arms Race' Could Prove Costly

Looks for better ways to make sure supercomputers "address our current national priorities."

From ACM News

The Clock Is Ticking on Encryption

Today's secure cipher-text may be tomorrow's open book.

From ACM TechNews

European ­nion Funds Cloud Security Project

The European Union is funding Trustworthy Clouds, a research project aimed at developing a series of technical advances that will increase the security of cloud...

From ACM TechNews

'net Pioneers: Open Internet Should Be Separate

A group of Internet and technology pioneers recently filed a document with the U.S. Federal Communications Commission, advising the agency to allow for an open...

From ACM TechNews

W3c ­pdates Html5, Makes Math Easy

The W3C's updated MathML standard for rendering mathematical notations on Web pages better portrays math symbols and supports more languages. Designers will be...

China's 'Big Hole' Marks Scale of Supercomputing Race
From ACM News

China's 'Big Hole' Marks Scale of Supercomputing Race

1,000 U.S. scientists are involved in exascale development, but China and Europe have stepped up their investment, IBM warns.

Web Could Be Stylized By New W3c Font Platform
From ACM TechNews

Web Could Be Stylized By New W3c Font Platform

The World Wide Web Consortium's Web Fonts Working Group has launched version 1.0 of the Web Open File Format (WOFF), compression technology that will provide a...

From ACM TechNews

Some Experts Question Efforts to Identify Cyberattackers

Cybersecurity experts testifying at a recent U.S. House of Representatives subcommittee hearing disagreed about whether the federal government should explore new...

Researchers: Poor Password Practices Hurt Security for All
From ACM TechNews

Researchers: Poor Password Practices Hurt Security for All

University of Cambridge researchers recently completed a large study of password-protected Web sites and found that a lack of industry standards harms end-user...

From ACM TechNews

P2p Networks a Treasure Trove of Leaked Health Care Data, Study Finds

Dartmouth College researchers have found that health care data is as easily accessible on peer-to-peer (P2P) networks now as it was before the enactment of a new...

Researcher Aims to Secure RFID Tags
From ACM TechNews

Researcher Aims to Secure RFID Tags

Technology for providing alerts when information on RFID tags is being accessed and controlling access to private information was on display during the recent CHI...

From ACM TechNews

After Google-China Dust-­p, Cyberwar Emerges as a Threat

Recent cyberattacks against Google and other tech firms highlight concerns about adversaries' ability to launch a full-fledged cyberwar against the United States...

From ACM TechNews

Cyberattacks Are 'Existential Threat' to U.S., FBI Says

The threat from cyberattacks is so severe that it actually threatens the very existence of the United States, says Steven Chabinsky, the deputy assistant director...

Researchers Use Light From Leds to Send Data Wirelessly
From ACM TechNews

Researchers Use Light From Leds to Send Data Wirelessly

Fraunhofer Institute for Telecommunications researchers have experimented with using visible light from commercial light-emitting diodes (LEDs) to transmit data...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account