acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Protesters See Tweets Used Against Them
From ACM News

Protesters See Tweets Used Against Them

When Jeff Rae was arrested last October with hundreds of other Occupy Wall Street protesters during a march on the Brooklyn Bridge, he decided to fight the charges...

After Rutgers Spycam Case, ­niversities Grapple With Privacy Online
From ACM News

After Rutgers Spycam Case, ­niversities Grapple With Privacy Online

The conviction of Dharun Ravi in the Rutgers webcam spying trial last week raises difficult questions for universities when it comes to protecting students online...

The Soul of the New Hacktivist
From ACM News

The Soul of the New Hacktivist

In 1988, a Cornell graduate student, Robert Tappan Morris, let loose a computer worm on the fledgling version of the Internet. He said it was meant to be an experiment...

Hacktivists Out-Stole Cybercriminals in 2011
From ACM News

Hacktivists Out-Stole Cybercriminals in 2011

Just two years ago, cybercriminal gangs were behind record-breaking data breaches that resulted in the theft of millions of customer records. But the year 2011...

Preserving Digital Data
From Communications of the ACM

Preserving Digital Data

Scientific data is expanding at an unprecedented rate. While new tools are helping preserve this data, funding must be increased and policy coordination needs improvement...

Open For Business
From Communications of the ACM

Open For Business

Should academic articles be available for free on the Web?

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)
From ACM News

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)

The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze.

From ACM News

U.s. Accelerating Cyberweapon Research

The Pentagon is accelerating efforts to develop a new generation of cyberweapons capable of disrupting enemy military networks even when those networks are not...

Cryptography Pioneer: We Need Good Code
From ACM TechNews

Cryptography Pioneer: We Need Good Code

Whitfield Diffie, a pioneer of public-key cryptography, told the recent Black Hat Europe conference that a good plan to secure software is needed in the age of...

Drones Over America: What Can They See?
From ACM News

Drones Over America: What Can They See?

Unmanned aircraft systems, or drones, have long played a role in military operations. But imagine thousands of drones flying over U.S. skies—something we may see...

Wireless Medical Monitors Transforming Patient Care
From ACM News

Wireless Medical Monitors Transforming Patient Care

It's hard to find a better example of how technology is revolutionizing patient care than the tiny edible sensor Proteus Biomedical of Redwood City plans to begin...

New Interest in Hacking as Threat to Security
From ACM News

New Interest in Hacking as Threat to Security

During the five-month period between October and February, there were 86 reported attacks on computer systems in the United States that control critical infrastructure...

Behind The Mask, Accused Lulzsec Members Left Trail Of Clues Online
From ACM News

Behind The Mask, Accused Lulzsec Members Left Trail Of Clues Online

When the long arm of the law reached in to arrest members of Anonymous's senior leadership on Tuesday, speculation immediately turned to the identities of the six...

How Hackers Are Caught Out By Law Enforcers
From ACM News

How Hackers Are Caught Out By Law Enforcers

The Internet has gained a reputation as somewhere you can say and do anything with impunity, primarily because it is easy to disguise your identity.

Three Things that Scare Google
From ACM News

Three Things that Scare Google

Google Executive Chairman Eric Schmidt told a crowd of journalists Wednesday night that there are some things about technology and the Internet that scare him,...

Fbi's 'sabu' Hacker Was a Model Informant
From ACM News

Fbi's 'sabu' Hacker Was a Model Informant

As soon as he was caught, an influential computer hacker agreed to become a government informant and "literally worked around the clock" to help federal agents...

Your Kinect Is Watching You
From ACM News

Your Kinect Is Watching You

There is a wave of concern—completely justified, to my mind—over the privacy implications of our increasing reliance on Facebook and Google. What most people don’t...

From ACM News

How a Web Link Can Take Control of Your Phone

A chilling demonstration to a small, packed room at the recent RSA security conference showed how clicking a single bad Web link while using a phone running Google's...

The First Google Maps War
From ACM News

The First Google Maps War

Did Google Maps almost cause a war in 2010? On Nov. 3 of that year, Edén Pastora, the Nicaraguan official tasked with dredging the Rio San Juan, justified his country's...

Stakeout: How the Fbi Tracked and Busted a Chicago Anon
From ACM News

Stakeout: How the Fbi Tracked and Busted a Chicago Anon

"Script kiddie." No hacker worth his salt wants to hear the term used to describe him.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account