acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How Google Scans Your Gmail For Child Porn
From ACM News

How Google Scans Your Gmail For Child Porn

John Henry Skillern was arrested last Thursday for the possession of child pornography.

Twitter Bots Grow ­p and Take On the World
From ACM News

Twitter Bots Grow ­p and Take On the World

On 18 July, someone in the Russian government edited Wikipedia.

Big Data Firm Says It Can Link Snowden Data to Changed Terrorist Behavior
From ACM News

Big Data Firm Says It Can Link Snowden Data to Changed Terrorist Behavior

For nearly a year, U.S. government officials have said revelations from former NSA contract worker Edward Snowden harmed national security and allowed terrorists...

The Nsa's Cyber-King Goes Corporate
From ACM Opinion

The Nsa's Cyber-King Goes Corporate

Keith Alexander, the recently retired director of the National Security Agency, left many in Washington slack-jawed when it was reported that he might charge companies...

The Weird Reasons Why People Make ­p False Identities on the Internet
From ACM Opinion

The Weird Reasons Why People Make ­p False Identities on the Internet

Sockpuppetry—using false identities for deception—is centuries old, but the advent of the web has made creating sockpuppets, and falling for their tricks, easier...

How Spy Agencies Keep Their 'toys' from Law Enforcement
From ACM News

How Spy Agencies Keep Their 'toys' from Law Enforcement

A little over a decade ago, federal prosecutors used keystroke logging software to steal the encryption password of an alleged New Jersey mobster, Nicodemo Scarfo...

The Remarkable Story of the ­nderwater Internet
From ACM News

The Remarkable Story of the ­nderwater Internet

In October of 1971, in the midst of the Cold War, the nuclear-powered submarine USS Halibut entered heavily guarded Russian waters in the Sea of Okhotsk.

Meet the Online Tracking Device That Is Virtually Impossible to Block
From ACM News

Meet the Online Tracking Device That Is Virtually Impossible to Block

A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.com.

Russia Offers $110,000 to Crack Tor Anonymous Network
From ACM News

Russia Offers $110,000 to Crack Tor Anonymous Network

Russia has offered 3.9m roubles ($110,000; £65,000) in a contest seeking a way to crack the identities of users of the Tor network.

Behind the Smoking Guns: Inside Nypd's 21st Century Arsenal
From ACM News

Behind the Smoking Guns: Inside Nypd's 21st Century Arsenal

In the early morning hours of last Sept. 25, a stocky young man bolted the Bora Bora Lounge in Highbridge, the Bronx, with a gun in his hand and squeezed off seven...

How to Invent a Person Online
From ACM Opinion

How to Invent a Person Online

On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio.

Google's New Moonshot Project: The Human Body
From ACM News

Google's New Moonshot Project: The Human Body

Google Inc. has embarked on what may be its most ambitious and difficult science project ever: a quest inside the human body.

U.s. Government Chatbot Gets You to Tell All
From ACM News

U.s. Government Chatbot Gets You to Tell All

Want access to the U.S. government's secrets? Talk to the robot.

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud
From ACM News

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud

Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing...

Hello, My Name Is . . .
From Communications of the ACM

Hello, My Name Is . . .

Facial recognition and privacy concerns.

Researchers Probe Security Through Obscurity
From Communications of the ACM

Researchers Probe Security Through Obscurity

Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works.

Indonesian Techies Crowdsource Election Results
From ACM TechNews

Indonesian Techies Crowdsource Election Results

A trio of Indonesians working for international tech companies have used crowdsourcing to calculate a result for Indonesia's contested presidential election. 

How Technology Is Unraveling the Clues of Flight Mh17
From ACM News

How Technology Is Unraveling the Clues of Flight Mh17

Over the weekend, the Malaysia Airlines Flight MH17 tragedy turned into a "Law and Order" episode on the international stage with Secretary of State John Kerrymake...

The Growing Threat of Network-Based Steganography
From ACM TechNews

The Growing Threat of Network-Based Steganography

Researchers have uncovered Duqu, an unusual form of steganography-based malware that embeds itself in Microsoft Windows machines.

Talk on Cracking Internet Anonymity Service Tor Canceled
From ACM News

Talk on Cracking Internet Anonymity Service Tor Canceled

A highly anticipated talk on how to identify users of the Internet privacy service Tor was withdrawn from the upcoming Black Hat security conference, a spokeswoman...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account