acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Nsa Surveillance Makes For Strange Bedfellows
From ACM Opinion

Nsa Surveillance Makes For Strange Bedfellows

The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...

How the N.S.A Cracked the Web
From ACM News

How the N.S.A Cracked the Web

It's been nearly three months since Edward Snowden started telling the world about the National Security Agency's mass surveillance of global communications.

Huge Botnet Found ­sing Tor Network For Communications
From ACM News

Huge Botnet Found ­sing Tor Network For Communications

In the wake of the revelations surrounding the NSA's domestic surveillance and intelligence-gathering operations, security experts said there would likely be a...

Nsa Able to Foil Basic Safeguards of Privacy on Web
From ACM TechNews

Nsa Able to Foil Basic Safeguards of Privacy on Web

The National Security Agency uses a variety of means to overcome encryption technologies, such as supercomputers, technical strategies, court orders, and persuasion...

Tech Pioneer Vint Cerf on the Age of Context and Why You Can't Be a Citizen of the Internet
From ACM Opinion

Tech Pioneer Vint Cerf on the Age of Context and Why You Can't Be a Citizen of the Internet

Few people have as much claim as Vint Cerf to the title "Father of the Internet," but as the technologies he helped develop in the 1970s and 1980s become increasingly...

Your Phone Is Blabbing Your Location to Anyone Who Will Listen
From ACM News

Your Phone Is Blabbing Your Location to Anyone Who Will Listen

Everywhere you go, your phone is sending out signals that can be assembled to form a picture of your movements.

Drug Agents ­se Vast Phone Trove, Eclipsing N.s.a.'s
From ACM News

Drug Agents ­se Vast Phone Trove, Eclipsing N.s.a.'s

For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that...

How 'cell Tower Dumps' Caught the High Country Bandit—and Why It Matters
From ACM News

How 'cell Tower Dumps' Caught the High Country Bandit—and Why It Matters

On February 18, 2010, the FBI field office in Denver issued a "wanted" notice for two men known as "the High Country Bandits"—a rather grandiose name for a pair...

­.s. Appetite For Internet ­ser Data Not ­nique
From ACM TechNews

­.s. Appetite For Internet ­ser Data Not ­nique

Despite recent concerns about information collection by the United States, law enforcement agencies in Europe and other nations appear to gather equal or greater...

Vending Machines Get Smart to Accommodate the Cashless
From ACM Careers

Vending Machines Get Smart to Accommodate the Cashless

More than 40 percent of U.S. adults say they can go a week without paying for something with cash, according to a survey conducted by Rasmussen Reports last year...

Inside the Response to the New York Times Attack
From ACM News

Inside the Response to the New York Times Attack

Late Tuesday morning, one of the engineers in CloudFlare's San Francisco office saw a message on Twitter saying that the New York Times Web site was down. Minutes...

How Syrian Hackers Found the New York Times's Australian Weak Spot
From ACM News

How Syrian Hackers Found the New York Times's Australian Weak Spot

A hacking attack launched by the Syrian Electronic Army may have targeted the New York Timesand other U.S. media companies, but the weak link was Melbourne IT (...

Here's How One Hacker Is Waging War on the Syrian Government
From ACM Careers

Here's How One Hacker Is Waging War on the Syrian Government

As President Obama weighed U.S. air strikes in Syria this week, a lone American hacker was waging his own attack on the Syrian government.

How Scholars Hack the World of Academic Publishing Now
From ACM News

How Scholars Hack the World of Academic Publishing Now

If you want to understand the modern academy, it wouldn't hurt to start at "impact factor."

The New York Times Web Site Was Taken Down By Dns Hijacking. Here's What That Means.
From ACM News

The New York Times Web Site Was Taken Down By Dns Hijacking. Here's What That Means.

Just weeks after The Washington Post had our own run-in with the Syrian Electronic Army (SEA), the New York Times is down, and the SEA is claiming responsibility...

How Surveillance Changes Behavior: A Restaurant Workers Case Study
From ACM News

How Surveillance Changes Behavior: A Restaurant Workers Case Study

Surveillance is certainly much in the news lately. Most notably, of course, there is the continuing outcry over the National Security Agency’s call-tracking program...

How Snowden Did It
From ACM News

How Snowden Did It

When Edward Snowden stole the crown jewels of the National Security Agency, he didn't need to use any sophisticated devices or software or go around any computer...

Productivity Tools For Cybercrime
From ACM News

Productivity Tools For Cybercrime

Stealing 10 million dollars a few hundred dollars at a time used to be too labor-intensive to be a great business.

The Pentagon as Silicon Valley's Incubator
From ACM News

The Pentagon as Silicon Valley's Incubator

In the ranks of technology incubator programs, there is AngelPad here in San Francisco and Y Combinator about 40 miles south in Mountain View. And then there is...

In Markets' Tuned-­p Machinery, Stubborn Ghosts Remain
From ACM News

In Markets' Tuned-­p Machinery, Stubborn Ghosts Remain

A generation ago, when the stock market crashed on Oct. 19, 1987, the Nasdaq stock market appeared to have done much better than the New York Stock Exchange.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account