acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Pentagon to Boost Cybersecurity Force
From ACM TechNews

Pentagon to Boost Cybersecurity Force

The Pentagon has approved plans to expand its cybersecurity force more than fivefold to protect the U.S.'s critical computer systems and conduct offensive computer...

Banks Seek Nsa Help Amid Attacks on Their Computer Systems
From ACM News

Banks Seek Nsa Help Amid Attacks on Their Computer Systems

Major U.S. banks have turned to the National Security Agency for help protecting their computer systems after a barrage of assaults that have disrupted their Web...

Online College Courses to Grant Credentials, For a Fee
From ACM TechNews

Online College Courses to Grant Credentials, For a Fee

Free online college course providers are experimenting with security features that will enable students who successfully complete the courses to pay a small fee...

To Thwart Hackers, Firms Salting Their Servers With Fake Data
From ACM TechNews

To Thwart Hackers, Firms Salting Their Servers With Fake Data

Some companies are increasingly making use of controversial cybersecurity tactics involving the use of fake data on servers and Web sites meant to ensnare hackers...

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive
From ACM News

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive

Some of the most important clues about what drove Adam Lanza to mass murder probably sit on the computer that the reclusive, technical-minded 20-year-old used as...

In South Korea, the Republic of Samsung
From ACM Careers

In South Korea, the Republic of Samsung

So sprawling is Samsung’s modern-day empire that some South Koreans say it has become possible to live a Samsung-only life: You can use a Samsung credit card to...

Whither Nasa?
From ACM News

Whither Nasa?

Two years ago, President Obama told a crowd of more than 200 people assembled in Cape Canaveral, Fla., that a manned mission to an asteroid by 2025 would be among...

Hacker Locates John Mcafee Through Smartphone Tracks
From ACM News

Hacker Locates John Mcafee Through Smartphone Tracks

Weeks of international intrigue about the whereabouts of tech millionaire John McAfee ended Tuesday after the Internet pioneer made an elementary digital mistake...

Cybercity Allows Government Hackers to Train For Attacks
From ACM TechNews

Cybercity Allows Government Hackers to Train For Attacks

The Pentagon is building a virtual city that will enable government hackers to practice attacking and defending the computers and networks that increasingly run...

Web Monitor: 100 Percent of Syria's Internet Just Shut Down
From ACM News

Web Monitor: 100 Percent of Syria's Internet Just Shut Down

It appears that the Syrian government may have just taken a drastic measure it has conspicuously avoided over the nearly two years of fighting: cutting itself off...

In Fairfax County, the Classroom Is a (cyber) Battlefield
From ACM TechNews

In Fairfax County, the Classroom Is a (cyber) Battlefield

Thousands of students across the U.S. recently participated in the opening round of the CyberPatriot challenge, the premier high school cyberwarfare competition...

From ACM News

When Is a Cyberattack an Act of War?

On the night of Oct. 11, Defense Secretary Leon Panetta stood inside the Intrepid Sea, Air and Space Museum, housed in a former aircraft carrier moored at a New...

The Economics of Video Games
From ACM News

The Economics of Video Games

Inflation can be a headache for any central banker. But it takes a certain type of economist to know what to do when a belligerent spaceship fleet attacks an interstellar...

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems
From ACM News

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems

The emails arrived like poison darts from cyberspace.

From ACM News

Google's Restricting of Anti-Muslim Video Shows Role of Web Firms As Free-Speech Arbiters

Google lists eight reasons on its "YouTube Community Guidelines" page for why it might take down a video. Inciting riots is not among them.

Secrecy Surrounding 'zero-Day Exploits' Industry Spurs Calls For Government Oversight
From ACM TechNews

Secrecy Surrounding 'zero-Day Exploits' Industry Spurs Calls For Government Oversight

A barely regulated industry for zero-day exploits sold by researchers has sprung up, and even certain insiders believe trade of these hacker or security tools...

Gps Technology Finding Its Way Into Court
From ACM News

Gps Technology Finding Its Way Into Court

The rapid spread of cellphones with GPS technology has allowed police to track suspects with unprecedented precision—even as they commit crimes. But the legal fight...

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks
From ACM News

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks

John Sublett and his colleagues had an audacious, digital-age plan. They wanted to use the Internet to enable businesses to manage any kind of electronic device...

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say
From ACM News

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed...

'big Data' from Social Media, Elsewhere Online Redefines Trend-Watching
From ACM News

'big Data' from Social Media, Elsewhere Online Redefines Trend-Watching

From a trading desk in London, Paul Hawtin monitors the fire hose of more than 340 million Twitter posts flying around the world each day to try to assess the collective...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account