acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTHE New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Scientists Strive to Map the Shape-Shifting Net
From ACM News

Scientists Strive to Map the Shape-Shifting Net

In a dimly lit chamber festooned with wires and hidden in one of California’s largest data centers, Tim Pozar is changing the shape of the Internet. He is using...

Two Chinese Schools Said to Be Tied to Online Attacks
From ACM News

Two Chinese Schools Said to Be Tied to Online Attacks

A series of online attacks on Google and dozens of other American corporations have been traced to computers at two educational institutions in China, including...

Do-It-Yourself Genetic Engineering
From ACM News

Do-It-Yourself Genetic Engineering

It all started with a brawny, tattooed building contractor with a passion for exotic animals. He was taking biology classes at City College of San Francisco, a...

Google Set to Showcase Fast Internet
From ACM News

Google Set to Showcase Fast Internet

Google said Wednesday that it would offer ultrahigh-speed Internet access in some communities in a test that could showcase the kinds of things that would be possible...

From ACM News

­.s. Scientists Given Access to Cloud Computing

The National Science Foundation and the Microsoft Corporation have agreed to offer American scientific researchers free access to the company’s new cloud computing...

Hacking For Fun and Profit in China's Underworld
From ACM News

Hacking For Fun and Profit in China's Underworld

With a few quick keystrokes, a computer hacker who goes by the code name Majia calls up a screen displaying his latest victims. He operates secretly and illegally...

Smart Dust? Not Quite, but We
From ACM News

Smart Dust? Not Quite, but We

In computing, the vision always precedes the reality by a decade or more. The pattern has held true from the personal computer to the Internet, as it takes time...

In Digital Combat, U.s. Finds No Easy Deterrent
From ACM News

In Digital Combat, U.s. Finds No Easy Deterrent

On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the...

From ACM News

If Your Password Is 123456, Just Make It Hackme

Back at the dawn of the Web, the most popular account password was “12345.” Today, it’s one digit longer but hardly safer: “123456.” Despite all the reports...

From ACM News

Fearing Hackers Who Leave No Trace

The crown jewels of Google, Cisco Systems or any other technology company are the millions of lines of programming instructions, known as source code, that make...

From ACM TechNews

Wanted: Cyber Ninjas

U.S. colleges are adding courses and specialized degrees in the once-exotic field of cybersecurity to try to meet the growing demands for computer security skills...

From ACM News

Are Doctors Ready for Virtual Visits?

For over a decade now, health care experts have been promoting telemedicine, or the use of satellite technology, video conferencing and data transfer through phones...

Obama to Name Chief of Cybersecurity
From ACM News

Obama to Name Chief of Cybersecurity

Nearly seven months after highlighting the vulnerability of banking, energy and communications systems to Internet attacks, the White House on Tuesday is expected...

From ACM News

Google Offers Peek at Operating System, a Potential Challenge to Windows

MOUNTAIN VIEW, Calif. — Google began lifting the veil on its planned Chrome operating system on Thursday, but it said that computers powered by the software would...

From ACM News

Defying Experts, Rogue Computer Code Still Lurks

Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...

Halted '03 Iraq Plan Illustrates ­.s. Fear of Cyberwar Risk
From ACM TechNews

Halted '03 Iraq Plan Illustrates ­.s. Fear of Cyberwar Risk

At the core of the U.S. Obama Administration and its Pentagon leadership's efforts to develop rules governing cyberwarfare is the question of whether offensive...

From ACM TechNews

Researchers Try to Stalk Botnets ­sed By Hackers

To track the spread of botnets, Sandia National Laboratories computer security specialists Rob Minnich and Don Rudish have converted a Dell Thunderbird supercomputer...

From ACM TechNews

E-Mail Surveillance Renews Concerns in Congress

A National Security Agency (NSA) operation involving surveillance of American residents' communications, especially domestic email, is fueling debate in the U.S...

From ACM TechNews

Obama Outlines Coordinated Cyber-Security Plan

U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...

Contractors Vie For Plum Work, Hacking For U.s.
From ACM News

Contractors Vie For Plum Work, Hacking For U.s.

The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account