acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


U.s. Homeland Chief: Cyber 9/11 Could Happen 'imminently'
From ACM News

U.s. Homeland Chief: Cyber 9/11 Could Happen 'imminently'

Homeland Security Secretary Janet Napolitano warned on Thursday that a major cyber attack is a looming threat and could have the same sort of impact as last year's...

Google Report Reveals Continued Rise in ­.S. Government Requests for Data
From ACM News

Google Report Reveals Continued Rise in ­.S. Government Requests for Data

Google has revealed the full scale of the U.S. government's use of controversial legislation that bypasses judicial approval to access the online information of...

Dod Looking to 'jump the Gap' Into Adversaries' Closed Networks
From ACM News

Dod Looking to 'jump the Gap' Into Adversaries' Closed Networks

Iran's uranium enrichment facility at Natanz may have had one of the most secure computer systems in the world.

The Fbi Needs Hackers, Not Backdoors
From ACM Opinion

The Fbi Needs Hackers, Not Backdoors

Just imagine if all the applications and services you saw or heard about at CES earlier this month had to be designed to be "wiretap ready" before they could be...

Atari's Bankruptcy: Gen X Bids Pong Farewell
From ACM Careers

Atari's Bankruptcy: Gen X Bids Pong Farewell

Reading the news that Atari’s U.S. subsidiary is filing for bankruptcy was a little like hearing that Bob Hope died—in that you were surprised to discover he had...

Why Are the Batteries in Boeing's 787 Burning?
From ACM News

Why Are the Batteries in Boeing's 787 Burning?

Boeing's 787 Dreamliner has not had a charmed birth. While some of its problems—a windshield crack, minor fuel leaks—can easily be dealt with, the issues that have...

Iran Strengthened Cyber Capabilities After Stuxnet: U.s. General
From ACM News

Iran Strengthened Cyber Capabilities After Stuxnet: U.s. General

Iran responded to a 2010 cyber attack on its nuclear facilities by beefing up its own cyber capabilities, and will be a "force to be reckoned with" in the future...

Can You Predict the Future By Reading Twitter? The Pentagon Thinks Maybe
From ACM News

Can You Predict the Future By Reading Twitter? The Pentagon Thinks Maybe

The Defense Department wants new computer tools to analyze mounds of unstructured text, blogs, and tweets as part of a coordinated push to help military analysts...

­.s. Cities Relying on Precog Software to Predict Murder
From ACM News

­.s. Cities Relying on Precog Software to Predict Murder

Who needs the freaky precogs of Minority Report to predict if someone’s likely to commit murder when you have an algorithm that can do it for you?

From ACM News

Big Blue Is Still the Big Dog of Patents

Computing giant IBM has retained its position as the company granted the most patents in the year. It’s the 20th consecutive year that IBM has done so. 

Banks Seek Nsa Help Amid Attacks on Their Computer Systems
From ACM News

Banks Seek Nsa Help Amid Attacks on Their Computer Systems

Major U.S. banks have turned to the National Security Agency for help protecting their computer systems after a barrage of assaults that have disrupted their Web...

How the Government's 2013 Tech Policy Agenda Will Impact IT
From ACM TechNews

How the Government's 2013 Tech Policy Agenda Will Impact IT

Cybersecurity is the most urgent of the critical technology issues that lawmakers and regulators will grapple with in 2013. The White House is expected to ask...

­.N. Plans Internet Governance Amid Outcry to Defund IT­
From ACM TechNews

­.N. Plans Internet Governance Amid Outcry to Defund IT­

A petition to de-fund the United Nation's telecommunications branch recently emerged, just as the ITU was ready to finalize Internet governance plans at the World...

Robocallers Stand Out in a Troll Through Chinese Cellphone Records
From ACM News

Robocallers Stand Out in a Troll Through Chinese Cellphone Records

The availability of electronic records of communications, from the use of cellphones to chats in online games, has given social scientists new options for studying...

Cyberwar's Gray Market
From ACM News

Cyberwar's Gray Market

Behind computer screens from France to Fort Worth, Texas, elite hackers hunt for security vulnerabilities worth thousands of dollars on a secretive unregulated...

From ACM News

Malicious Virus Shuttered Power Plant: Dhs

A computer virus attacked a turbine control system at a power company when a technician unknowingly inserted an infected USB computer drive into the network, keeping...

Graphene: Patent Surge Reveals Global Race
From ACM News

Graphene: Patent Surge Reveals Global Race

Latest figures show a sharp rise in patents filed to claim rights over different aspects of graphene since 2007, with a further spike last year.

Facebook on Collision Course With Google on Web Searches
From ACM News

Facebook on Collision Course With Google on Web Searches

After years of collecting photos and personal data from its billion-plus members, Facebook Inc. Tuesday unveiled a search tool that sifts through people's profiles—and...

Rocra Espionage Malware Campaign ­ncovered After Five Years of Activity
From ACM News

Rocra Espionage Malware Campaign ­ncovered After Five Years of Activity

For five years, it hid in the weeds of networks used by Eastern European diplomats, government employees and scientific research organizations, stealing data and...

Their Apps Track You. Will Congress Track Them?
From ACM News

Their Apps Track You. Will Congress Track Them?

There are three things that matter in consumer data collection: location, location, location.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account