acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectLegal Aspects
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


U.s. Cybersecurity Policy Draws Interest from Companies, Lobbyists
From ACM News

U.s. Cybersecurity Policy Draws Interest from Companies, Lobbyists

The determination by Congress and President Obama to protect networks of critical U.S. industries from hackers and cyberspies is creating an explosive growth opportunity—for...

Sequester Cuts University Research Funds
From ACM TechNews

Sequester Cuts University Research Funds

The federal government is reducing support for academic laboratories across the United States to satisfy the sequester mandate to cut spending. The budget sequester...

Pentagon Creating Teams to Launch Cyberattacks as Threat Grows
From ACM News

Pentagon Creating Teams to Launch Cyberattacks as Threat Grows

The Pentagon's Cyber Command will create 13 offensive teams by the fall of 2015 to help defend the nation against major computer attacks from abroad, Gen. Keith...

Web-Connected Cars Bring Privacy Concerns
From ACM TechNews

Web-Connected Cars Bring Privacy Concerns

Privacy advocates fear linking cars with wireless networks may be giving automakers, software developers, and police officers access to such information. 

Web-Connected Cars Bring Privacy Concerns
From ACM News

Web-Connected Cars Bring Privacy Concerns

Cars will soon be so linked into wireless networks they will be like giant rolling smartphones—with calling systems, streaming video, cameras, and apps ­capable...

White House Opens More Federally Funded Scientific Research to the Public
From ACM News

White House Opens More Federally Funded Scientific Research to the Public

A new White House directive will allow the general public more access to federally funded scientific research, the Obama administration announced at the end of...

Banks Seek Nsa Help Amid Attacks on Their Computer Systems
From ACM News

Banks Seek Nsa Help Amid Attacks on Their Computer Systems

Major U.S. banks have turned to the National Security Agency for help protecting their computer systems after a barrage of assaults that have disrupted their Web...

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive
From ACM News

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive

Some of the most important clues about what drove Adam Lanza to mass murder probably sit on the computer that the reclusive, technical-minded 20-year-old used as...

In South Korea, the Republic of Samsung
From ACM Careers

In South Korea, the Republic of Samsung

So sprawling is Samsung’s modern-day empire that some South Koreans say it has become possible to live a Samsung-only life: You can use a Samsung credit card to...

Hacker Locates John Mcafee Through Smartphone Tracks
From ACM News

Hacker Locates John Mcafee Through Smartphone Tracks

Weeks of international intrigue about the whereabouts of tech millionaire John McAfee ended Tuesday after the Internet pioneer made an elementary digital mistake...

Web Monitor: 100 Percent of Syria's Internet Just Shut Down
From ACM News

Web Monitor: 100 Percent of Syria's Internet Just Shut Down

It appears that the Syrian government may have just taken a drastic measure it has conspicuously avoided over the nearly two years of fighting: cutting itself off...

From ACM News

When Is a Cyberattack an Act of War?

On the night of Oct. 11, Defense Secretary Leon Panetta stood inside the Intrepid Sea, Air and Space Museum, housed in a former aircraft carrier moored at a New...

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems
From ACM News

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems

The emails arrived like poison darts from cyberspace.

From ACM News

Google's Restricting of Anti-Muslim Video Shows Role of Web Firms As Free-Speech Arbiters

Google lists eight reasons on its "YouTube Community Guidelines" page for why it might take down a video. Inciting riots is not among them.

Gps Technology Finding Its Way Into Court
From ACM News

Gps Technology Finding Its Way Into Court

The rapid spread of cellphones with GPS technology has allowed police to track suspects with unprecedented precision—even as they commit crimes. But the legal fight...

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks
From ACM News

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks

John Sublett and his colleagues had an audacious, digital-age plan. They wanted to use the Internet to enable businesses to manage any kind of electronic device...

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say
From ACM News

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed...

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks
From ACM News

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks

It began as a hobby for a ­teenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet.

Law Allows Creationism to Be Taught in Tenn. Public Schools
From ACM News

Law Allows Creationism to Be Taught in Tenn. Public Schools

A bill that allows Tennessee public school teachers to teach alternatives to mainstream scientific theories, such as evolution, will become law this month after...

From ACM News

U.s. Accelerating Cyberweapon Research

The Pentagon is accelerating efforts to develop a new generation of cyberweapons capable of disrupting enemy military networks even when those networks are not...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account