acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How Safe Are Perl, Php, and Ruby? The Experts Weigh In
From ACM TechNews

How Safe Are Perl, Php, and Ruby? The Experts Weigh In

Many developers of programming languages are quick to defend the security of their language. 

­S Government and Private Sector Developing 'precrime' System to Anticipate Cyber-Attacks
From ACM News

­S Government and Private Sector Developing 'precrime' System to Anticipate Cyber-Attacks

The USA's Office of the Director of National Intelligence (ODNI) is soliciting the involvement of the private and academic sectors in developing a new 'precrime'...

How the Military Will Fight Isis on the Dark Web
From ACM News

How the Military Will Fight Isis on the Dark Web

The Dark Web is not so much a place as it is a method of achieving a level of anonymity online.

Surprise! America Already Has a Manhattan Project For Developing Cyber Attacks
From ACM News

Surprise! America Already Has a Manhattan Project For Developing Cyber Attacks

"What we really need is a Manhattan Project for cybersecurity." It's a sentiment that swells up every few years in the wake of some huge computer intrusion—most...

More Watchful Eye Needed on 'dark Web' and Cybercriminal Activities, Notes New Paper
From ACM TechNews

More Watchful Eye Needed on 'dark Web' and Cybercriminal Activities, Notes New Paper

New research calls for increased monitoring of the Dark Web by security researchers and government investigators. 

Building a Face, and a Case, on Dna
From ACM News

Building a Face, and a Case, on Dna

There were no known eyewitnesses to the murder of a young woman and her 3-year-old daughter four years ago. No security cameras caught a figure coming or going.

Experts: Infrastructure 'legitimate Target' in Battle For Cyber Supremacy
From ACM TechNews

Experts: Infrastructure 'legitimate Target' in Battle For Cyber Supremacy

The leaders of the U.S. Defense Department, National Security Agency, and Cyber Command have all warned of the potential for a cyber 9/11.

Document Reveals Growth of Cyberwarfare Between the ­.S. and Iran
From ACM News

Document Reveals Growth of Cyberwarfare Between the ­.S. and Iran

A newly disclosed National Security Agency document illustrates the striking acceleration of the use of cyberweapons by the United States and Iran against eachnuclear...

Social Network Analysis Privacy Tackled
From ACM TechNews

Social Network Analysis Privacy Tackled

Pennsylvania State University researchers are researching ways to maintain privacy on social networks.

Python For Beginners
From Communications of the ACM

Python For Beginners

A survey found the language in use in introductory programming classes in the top U.S. computer science schools.

Internet of Dna
From ACM News

Internet of Dna

Noah is a six-year-old suffering from a disorder without a name.

Meet Kevin Ashton, Father of the Internet of Things
From ACM Careers

Meet Kevin Ashton, Father of the Internet of Things

The Internet of Things started in the mid-1990s, when a quirky young brand manager in the U.K. puzzled over why a shade of brown lipstick kept disappearing from...

Poor Decision-Making Can Lead to Cybersecurity Breaches
From ACM TechNews

Poor Decision-Making Can Lead to Cybersecurity Breaches

Michigan State University professor Rick Walsh is studying the reasoning process behind the decisions people make that lead to computer security breaches. 

Spies Can Track You Just By Watching Your Phone's Power ­se
From ACM TechNews

Spies Can Track You Just By Watching Your Phone's Power ­se

A new paper from a team of researchers found it is possible to determine an Android phone's location and movement by monitoring and analyzing its power consumption...

Secrets Become History: Edward Snowden in Citizenfour Wins Documentary Oscar
From ACM Opinion

Secrets Become History: Edward Snowden in Citizenfour Wins Documentary Oscar

Citizenfour is filmmaker Laura Poitras' account of the first meetings between herself, Glenn Greenwald, and Edward Snowden.

What 'the Imitation Game' Didn't Tell You About Turing's Greatest Triumph
From ACM Opinion

What 'the Imitation Game' Didn't Tell You About Turing's Greatest Triumph

Freeman Dyson, 91, the famed physicist, author and oracle of human destiny, is holding forth after tea-time one February afternoon in the common room of the Institute...

Beijing Subway Swipe Data Betrays Social Class
From ACM News

Beijing Subway Swipe Data Betrays Social Class

Beijing is an enormous city, sprawling over an area 10 times larger than Greater London.

Spies Can Track You Just By Watching Your Phone's Power ­se
From ACM News

Spies Can Track You Just By Watching Your Phone's Power ­se

Smartphone users might balk at letting a random app like Candy Crush or Shazam track their every move via GPS. But researchers have found that Android phones reveal...

Is Your Toaster a Silent Recruit in a 'thingbot' Army?
From ACM News

Is Your Toaster a Silent Recruit in a 'thingbot' Army?

All kinds of gadgets, from toasters to sprinklers, fridges to domestic heating systems, are now boasting sensors, actuators and low-powered embedded chips.

The Great Sim Heist
From ACM News

The Great Sim Heist

American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account