acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cybersecurity
From Communications of the ACM

Cybersecurity

2002 ACM Turing laureate Len Adleman, 2014 ACM Prize in Computing recipient Dan Boneh, 2015 ACM Grace Murray Hopper Award recipient Brent Waters, and ACM Fellows...

Hash Function Sha-1 Is Broken
From ACM News

Hash Function Sha-1 Is Broken

The industry should be scrambling for upgrades.   

Coders and Librarians Team ­p to Save Scientific Data
From ACM TechNews

Coders and Librarians Team ­p to Save Scientific Data

Software programmers, librarians, and others are archiving scientific data from government websites.

Inside the Hunt For Russia's Most Notorious Hacker
From ACM News

Inside the Hunt For Russia's Most Notorious Hacker

On the morning of December 30, the day after Barack Obama imposed sanctions on Russia for interfering in the 2016 US election, Tillmann Werner was sitting down...

Researchers Present Early Warning System For Mass Cyberattacks
From ACM TechNews

Researchers Present Early Warning System For Mass Cyberattacks

Researchers have developed an early warning system for massive distributed denial-of-service attacks.

Hkbu Scholar Invents World's First 'lip Password:' A Patented Double Security System For Identity Authentication
From ACM TechNews

Hkbu Scholar Invents World's First 'lip Password:' A Patented Double Security System For Identity Authentication

Researchers at Hong Kong Baptist University have developed new technology that utilizes a person's lip motions to create a password.

What If Quantum Computers ­sed Hard Drives Made of Dna?
From ACM News

What If Quantum Computers ­sed Hard Drives Made of Dna?

You've heard the hype: The quantum computer revolution is coming. Physicists say these devices will be fast enough to break every encryption method banks use today...

Doubts About Whether Internet Filters Protect Teenagers Online
From ACM TechNews

Doubts About Whether Internet Filters Protect Teenagers Online

Researchers surveyed 515 teenagers and their parents about whether they used technical tools to control or manage access to online content.

Why We Should Not Know Our Own Passwords
From ACM TechNews

Why We Should Not Know Our Own Passwords

There is active research transpiring in the area of unknowable password development.

It's Possible to Hack a Phone With Sound Waves, Researchers Show
From ACM News

It's Possible to Hack a Phone With Sound Waves, Researchers Show

A security loophole that would allow someone to add extra steps to the counter on your Fitbit monitor might seem harmless. But researchers say it points to the...

Tim Berners-Lee: I Invented the Web. Here Are Three Things We Need to Change to Save It
From ACM TechNews

Tim Berners-Lee: I Invented the Web. Here Are Three Things We Need to Change to Save It

World Wide Web pioneer Sir Tim Berners-Lee warns of three trends to be overcome in order to sustain the Web as beneficial for everyone.

Can Amazon Echo Help Solve a Murder? Police Will Soon Find Out.
From ACM News

Can Amazon Echo Help Solve a Murder? Police Will Soon Find Out.

A 2015 Arkansas murder case that had raised privacy questions surrounding "always-on" electronic home devices took a step forward last week after Amazon agreed...

Researchers Can Predict Terrorist Behaviors With More Than 90 Percent Accuracy
From ACM TechNews

Researchers Can Predict Terrorist Behaviors With More Than 90 Percent Accuracy

The Networked Pattern Recognition Framework works to predict future terrorist behaviors by defining past attack patterns.

How the Cia's Hacking Hoard Makes Everyone Less Secure
From ACM News

How the Cia's Hacking Hoard Makes Everyone Less Secure

When Wikileaks yesterday released a trove of documents purporting to show how the CIA hacks everything from smartphones to PCs to smart televisions, the agency's...

The Darknet Protects Itself By Being More Robust Against Attacks
From ACM TechNews

The Darknet Protects Itself By Being More Robust Against Attacks

Researchers have found the darknet is especially good at protecting users' privacy and anonymity because it can counter large cyberattacks on its own by spontaneously...

Wikileaks: The CIA Is Using Popular Tvs, Smartphones and Cars to Spy on Their Owners
From ACM News

Wikileaks: The CIA Is Using Popular Tvs, Smartphones and Cars to Spy on Their Owners

The latest revelations about U.S. government's powerful hacking tools potentially takes surveillance right into the homes and hip pockets of billions of users worldwide...

Mathematician Breaks Down How to Defend Against Quantum Computing Attacks
From ACM TechNews

Mathematician Breaks Down How to Defend Against Quantum Computing Attacks

A mathematician has created and released software that could protect encrypted code from hackers armed with next-generation quantum computers.

How Hard Is It to Get an Intelligence Wiretap? Pretty Hard. 
From ACM News

How Hard Is It to Get an Intelligence Wiretap? Pretty Hard. 

Wiretaps on Americans in foreign intelligence investigations are not easy to get. And if you're a candidate for president, it's even harder. 

To Keep Tor Hack Source Code Secret, Doj Dismisses Child Porn Case
From ACM News

To Keep Tor Hack Source Code Secret, Doj Dismisses Child Porn Case

Rather than share the now-classified technological means that investigators used to locate a child porn suspect, federal prosecutors in Washington state have ...

Why the Dark Net Is More Resilient to Attack Than the Internet
From ACM TechNews

Why the Dark Net Is More Resilient to Attack Than the Internet

Researchers who built their own model of the dark net ran simulations to see how the model would react to three failure scenarios.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account