acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


As New Targets For Hackers, Your Car and Your House
From ACM News

As New Targets For Hackers, Your Car and Your House

Imagine driving on the freeway at 60 miles per hour and your car suddenly screeches to a halt, causing a pileup that injures dozens of people.

Linkedin Connects Big Data, Human Resources
From ACM Careers

Linkedin Connects Big Data, Human Resources

Every second, more than two more people join LinkedIn's network of 238 million members.

How Wearable Technology Could Transform Business
From ACM Opinion

How Wearable Technology Could Transform Business

Once upon a time seeing your life flash before your eyes was something people did their best to avoid. The arrival of Google Glass seems to have changed that.

Nsa Claims It 'touches' Only 1.6 Percent of Internet Traffic
From ACM News

Nsa Claims It 'touches' Only 1.6 Percent of Internet Traffic

Just hours after President Obama defended the National Security Agency's activities, the foreign surveillance agency released a document in which it claims to review...

Nsa to Cut System Administrators By 90 Percent to Limit Data Access
From ACM News

Nsa to Cut System Administrators By 90 Percent to Limit Data Access

The U.S. National Security Agency, hit by disclosures of classified data by former contractor Edward Snowden, said Thursday it intends to eliminate about 90 percent...

Silent Circle Follows Lavabit in Shuttering Encrypted Email
From ACM News

Silent Circle Follows Lavabit in Shuttering Encrypted Email

Silent Circle shuttered its encrypted email service on Thursday, the second such closure in just a few hours in an apparent attempt to avoid government scrutiny...

From ACM News

N.s.a. Said to Search Content of Messages to and From U.s.

The National Security Agency is searching the contents of vast amounts of Americans' email and text communications into and out of the country, hunting for people...

Congress Posts ­.s. Code in Xml
From ACM TechNews

Congress Posts ­.s. Code in Xml

The U.S. House of Representatives has published all 51 titles of the U.S. Code in XML format for download, as part of the its open government initiative.

Fledgling 3D Printing Industry Finds Home in Nyc
From ACM Careers

Fledgling 3D Printing Industry Finds Home in Nyc

It looks like a bakery. A warm glow emanates from the windows of big, oven-like machines, and a dusting of white powder covers everything.

Former Nsa Chief on Latest Leaked Dragnet Spy Program: It's Real, and It's Spectacular
From ACM Opinion

Former Nsa Chief on Latest Leaked Dragnet Spy Program: It's Real, and It's Spectacular

Does the NSA really operate a vast database that allows its analysts to sift through millions of records showing nearly everything a user does on the Internet,...

The Five Scariest Hacks We Saw Last Week
From ACM News

The Five Scariest Hacks We Saw Last Week

If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs...

Users of Hidden Net Advised to Ditch Windows
From ACM News

Users of Hidden Net Advised to Ditch Windows

Legitimate users of the Tor anonymous browsing service are being advised to stop using Windows if they want to keep their identity hidden.

Nsa Revelations Could Hurt Collaboration with 'betrayed' Hackers
From ACM Careers

Nsa Revelations Could Hurt Collaboration with 'betrayed' Hackers

The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private...

Crypto Experts Issue a Call to Arms to Avert the Cryptopocalypse
From ACM News

Crypto Experts Issue a Call to Arms to Avert the Cryptopocalypse

At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved...

Fbi Taps Hacker Tactics to Spy on Suspects
From ACM News

Fbi Taps Hacker Tactics to Spy on Suspects

Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal...

From ACM Opinion

Google's Science Fellows Challenge the Company's Fund-Raising For Senator Inhofe

Ten years ago this week, Senator James M. Inhofe, the Republican from Oklahoma, used a two-hour floor speech to launch his campaign on the credibility of climate...

Google's Data-Trove Dance
From ACM News

Google's Data-Trove Dance

In 2011, Google Inc. Chief Executive and co-founder Larry Page asked executives to develop a new, simplified privacy tool that would act as a kind of sliding scale...

NSA Announces Winner of Its First Annual 'Science of Security Competition'
From ACM Careers

NSA Announces Winner of Its First Annual 'Science of Security Competition'

A research paper that was highlighted last year at an international symposium is the winner of the National Security Agency's first annual Science of Security (SoS)...

They Know Much More Than You Think
From ACM Opinion

They Know Much More Than You Think

In mid-May, Edward Snowden, an American in his late twenties, walked through the onyx entrance of the Mira Hotel on Nathan Road in Hong Kong and checked in.

Government Can Grab Cell Phone Location Records Without Warrant, Appeals Court Says
From ACM News

Government Can Grab Cell Phone Location Records Without Warrant, Appeals Court Says

In a major victory for the Justice Department over privacy advocates, a federal appeals court ruled Tuesday that government agencies can collect records showing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account