acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectCommunications / Networking
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Banks Seek Nsa Help Amid Attacks on Their Computer Systems
From ACM News

Banks Seek Nsa Help Amid Attacks on Their Computer Systems

Major U.S. banks have turned to the National Security Agency for help protecting their computer systems after a barrage of assaults that have disrupted their Web...

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive
From ACM News

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive

Some of the most important clues about what drove Adam Lanza to mass murder probably sit on the computer that the reclusive, technical-minded 20-year-old used as...

In South Korea, the Republic of Samsung
From ACM Careers

In South Korea, the Republic of Samsung

So sprawling is Samsung’s modern-day empire that some South Koreans say it has become possible to live a Samsung-only life: You can use a Samsung credit card to...

Hacker Locates John Mcafee Through Smartphone Tracks
From ACM News

Hacker Locates John Mcafee Through Smartphone Tracks

Weeks of international intrigue about the whereabouts of tech millionaire John McAfee ended Tuesday after the Internet pioneer made an elementary digital mistake...

Web Monitor: 100 Percent of Syria's Internet Just Shut Down
From ACM News

Web Monitor: 100 Percent of Syria's Internet Just Shut Down

It appears that the Syrian government may have just taken a drastic measure it has conspicuously avoided over the nearly two years of fighting: cutting itself off...

From ACM News

When Is a Cyberattack an Act of War?

On the night of Oct. 11, Defense Secretary Leon Panetta stood inside the Intrepid Sea, Air and Space Museum, housed in a former aircraft carrier moored at a New...

The Economics of Video Games
From ACM News

The Economics of Video Games

Inflation can be a headache for any central banker. But it takes a certain type of economist to know what to do when a belligerent spaceship fleet attacks an interstellar...

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems
From ACM News

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems

The emails arrived like poison darts from cyberspace.

From ACM News

Google's Restricting of Anti-Muslim Video Shows Role of Web Firms As Free-Speech Arbiters

Google lists eight reasons on its "YouTube Community Guidelines" page for why it might take down a video. Inciting riots is not among them.

Gps Technology Finding Its Way Into Court
From ACM News

Gps Technology Finding Its Way Into Court

The rapid spread of cellphones with GPS technology has allowed police to track suspects with unprecedented precision—even as they commit crimes. But the legal fight...

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks
From ACM News

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks

John Sublett and his colleagues had an audacious, digital-age plan. They wanted to use the Internet to enable businesses to manage any kind of electronic device...

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say
From ACM News

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed...

'big Data' from Social Media, Elsewhere Online Redefines Trend-Watching
From ACM News

'big Data' from Social Media, Elsewhere Online Redefines Trend-Watching

From a trading desk in London, Paul Hawtin monitors the fire hose of more than 340 million Twitter posts flying around the world each day to try to assess the collective...

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks
From ACM News

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks

It began as a hobby for a ­teenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet.

Google's Project Glass Engineers: Who Are They?
From ACM Careers

Google's Project Glass Engineers: Who Are They?

Google’s Project Glass has put new focus on Google X, the lab at the tech giant where engineers work to develop the next big thing.

Nasa Probe Offers New View of Mercury: Alien World Right in Our Back Yard
From ACM News

Nasa Probe Offers New View of Mercury: Alien World Right in Our Back Yard

The overheated, underappreciated runt of the solar system is finally getting some attention.

­.s. Accelerating Cyberweapon Research
From ACM TechNews

­.s. Accelerating Cyberweapon Research

Former and current U.S. officials say the Pentagon is ramping up projects to develop next-generation cyberweapons that can disrupt enemy military networks even...

From ACM News

U.s. Accelerating Cyberweapon Research

The Pentagon is accelerating efforts to develop a new generation of cyberweapons capable of disrupting enemy military networks even when those networks are not...

Google ­nified Privacy Settings ­nsettle ­sers
From ACM News

Google ­nified Privacy Settings ­nsettle ­sers

Google, I wish I knew how to quit you.

From ACM News

'do Not Track' Button

Alongside the news that the White House will announce voluntary privacy guidelines for Web companies comes the announcement from major online advertisers that they...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account