acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Aereo Analysis: Cloud Computing at a Crossroads
From ACM News

Aereo Analysis: Cloud Computing at a Crossroads

The question of whether online broadcast television is to remain in the hands of a stodgy industry that once declared the VCR the enemy is being put directly before...

Criminal Gang Connections Mapped via Phone Metadata
From ACM TechNews

Criminal Gang Connections Mapped via Phone Metadata

Software has been used to tap metadata from phones to map links between a criminal network in Sicily. 

Design Flaw in 'secure' Cloud Storage Puts Privacy at Risk, Jhu Researchers Say
From ACM TechNews

Design Flaw in 'secure' Cloud Storage Puts Privacy at Risk, Jhu Researchers Say

Researchers have found a flaw in the way secure cloud storage companies protect their customers' data, which could jeopardize the privacy protections they offer...

U.s. Promotes Network to Foil Digital Spying
From ACM TechNews

U.s. Promotes Network to Foil Digital Spying

A group of academics and computer enthusiasts have used the Tunisian town of Sayada as a test site for a local network that is physically independent from the Internet...

Trouble with Russia, Trouble with the Law: Inside Europe's Digital Crime Unit
From ACM News

Trouble with Russia, Trouble with the Law: Inside Europe's Digital Crime Unit

Four black brick towers search upwards to an empty grey sky.

Biometric Surveillance Means Someone Is Always Watching
From ACM News

Biometric Surveillance Means Someone Is Always Watching

Incrimination by selfie can happen.

Cyber Cops: Target Hackers May Takes Years to Find
From ACM News

Cyber Cops: Target Hackers May Takes Years to Find

Secret Service investigators say they are close to gaining a full understanding of the methods hackers used to breach Target's computer systems last December.

The U.s. Government Wants 6,000 New 'cyber Warriors' By 2016
From ACM Careers

The U.s. Government Wants 6,000 New 'cyber Warriors' By 2016

The Pentagon plans to triple its cybersecurity staff by 2016, U.S. Secretary of Defense Chuck Hagel announced recently.

Atomic Time Lord to Battle Sneaky High-Speed Trades
From ACM News

Atomic Time Lord to Battle Sneaky High-Speed Trades

Welcome to the room where time lives. I am standing in a space bristling with atomic clocks at the National Physical Laboratory in Teddington, U.K., which generates...

Google Maps Displays Crimean Border Differently In Russia, ­.s.
From ACM News

Google Maps Displays Crimean Border Differently In Russia, ­.s.

The U.S. sees Crimea as "occupied territory," as the government said in a recent statement.

Google, Once Disdainful of Lobbying, Now a Master of Washington Influence
From ACM News

Google, Once Disdainful of Lobbying, Now a Master of Washington Influence

In May 2012, the law school at George Mason University hosted a forum billed as a "vibrant discussion" about Internet search competition.

Internet of Things: The 'ghosts' that Haunt the Machine
From ACM News

Internet of Things: The 'ghosts' that Haunt the Machine


U.S. Rallied 120 Nations in Response to 2012 Cyberattack on American Banks
From ACM TechNews

U.S. Rallied 120 Nations in Response to 2012 Cyberattack on American Banks

In 2012, the Obama administration appealed to 120 nations to help block a wide-ranging cyberattack campaign against U.S. banks 

Heartbleed Bug's 'voluntary' Origins
From ACM News

Heartbleed Bug's 'voluntary' Origins

The encryption flaw that punctured the heart of the Internet this week underscores a weakness in Internet security: A good chunk of it is managed by four European...

Heartbleed: Developer Who Introduced the Error Regrets 'oversight'
From ACM Opinion

Heartbleed: Developer Who Introduced the Error Regrets 'oversight'

The developer who introduced the "Heartbleed" vulnerability to the open-source code used by thousands of websites has told the Guardian it was an "oversight"—but...

Forget Wearable Tech, Embeddable Implants Are Already Here
From ACM News

Forget Wearable Tech, Embeddable Implants Are Already Here

Smartphone mapping features are great for getting directions, until you lose signal.

Three Questions For Eugene Kaspersky
From ACM Opinion

Three Questions For Eugene Kaspersky

The Moscow-based computer security firm Kaspersky Lab has analyzed major new kinds of malware, including Stuxnet, which four years ago was revealed to have damaged...

Call of Cyber Duty: Military Academies Take on Nsa
From ACM Careers

Call of Cyber Duty: Military Academies Take on Nsa

If Douglas MacArthur or Ulysses S. Grant went to the U.S. Military Academy today, they might be testing their defensive skills hunched in front of a computer screen...

Supreme Court Weighing When Online Speech Becomes Illegal Threat
From ACM News

Supreme Court Weighing When Online Speech Becomes Illegal Threat

When does an online threat become worthy of criminal prosecution?

Meet Your Unborn Child—before It's Even Conceived
From ACM News

Meet Your Unborn Child—before It's Even Conceived

Will my baby be healthy?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account