acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


To Stop Cybercrime We Need to Think Like the Criminals
From ACM News

To Stop Cybercrime We Need to Think Like the Criminals

Whenever William Hague, our esteemed foreign secretary, speaks on the subject of cyberspace, what comes to mind is Dr Johnson’s celebrated comment about seeing...

Casino Cheats Snared by Smart Camera System
From ACM News

Casino Cheats Snared by Smart Camera System

People trying to cheat in casinos may soon be taking more of a gamble than they realise. Grosvenor Casinos, a major UK chain, is assessing software that can spot...

Feds Shift Tracking Defense
From ACM News

Feds Shift Tracking Defense

The U.S. Department of Justice now says its use of a cellphone-tracking device in a controversial Arizona case could be considered a "search" under the Fourth...

Stuxnet Raises 'blowback' Risk In Cyberwar
From ACM News

Stuxnet Raises 'blowback' Risk In Cyberwar

The Stuxnet computer worm, arguably the first and only cybersuperweapon ever deployed, continues to rattle security experts around the world, one year after its...

Outsmarted: Captcha Security Not Much of a Gotcha
From ACM News

Outsmarted: Captcha Security Not Much of a Gotcha

A team of Stanford University researchers has bad news to report about Captchas, those often unreadable, always annoying distorted letters that you're required...

The Future of Riots
From ACM News

The Future of Riots

On 6 August, peaceful protests over the police shooting of a local man in London's Tottenham district exploded into full-blown riots. During four days of assaults...

From ACM News

How Technical Glitches Foiled the Russian Sleeper Spies

Spying for Russia can be a hard life. The feds are on your trail, always trying to find out who you’re meeting with and talking to.

From ACM News

Kevin Mitnick Rates Today's Blackhats

Kevin Mitnick was hacking when the LulzSec kids were still in training pants.

New Technology Pinpoints Anomalies in Complex Financial Data
From ACM TechNews

New Technology Pinpoints Anomalies in Complex Financial Data

Battelle researchers at the U.S. Pacific Northwest National Laboratory have developed Anomalator, analytical software designed to recognize anomalous information...

From ACM News

Is Checking Sports Scores or Personal Email at Work a Crime?

The U.S. Court of Appeals for the Ninth Circuit has agreed to reconsider a 2-1 ruling issued in April that critics said made it a crime to violate an employer's...

A Social-Media Decoder
From ACM News

A Social-Media Decoder

From his 24th-floor corner office in midtown Manhattan, the veteran CBS research chief David Poltrack can gaze southward down the Avenue of the Americas, its...

Are Drones Creating a New Global Arms Race?
From ACM News

Are Drones Creating a New Global Arms Race?

Plastic tanks and miniature models of fighter jets are on display in Steven Zaloga's home office, and his bookshelves are overflowing with volumes about the history...

Patents Emerge as Significant Tech Strategy
From ACM TechNews

Patents Emerge as Significant Tech Strategy

Technology companies' patent practices have shifted from using them to defend their own inventions to deploying them as an important part of competitive strategies...

Revealed
From ACM News

Revealed

As protests against financial power sweep the world, science may have confirmed the protesters' worst fears. An analysis of the relationships between 43,000 transnational...

Did Android Copy Ios? We Asked Google's Product Manager...
From ACM Opinion

Did Android Copy Ios? We Asked Google's Product Manager...

Has Android copied elements from Apple's iOS? It's not a matter that Google's senior managers for the Android operating system want to get involved in.

11 Most Startling Revelations in 'steve Jobs'
From ACM News

11 Most Startling Revelations in 'steve Jobs'

Full disclosure: Steve Jobs was my white whale, the interview I wanted more than any other and the day he died I fashioned a black band across the Apple logo...

The Shocking Strangeness of Our 25-Year-Old Digital Privacy Law
From ACM Opinion

The Shocking Strangeness of Our 25-Year-Old Digital Privacy Law

The Electronic Communications Privacy Act (ECPA) was signed into law on October 21, 1986. Although it was forward-looking at the time, ECPA's privacy protections...

From ACM TechNews

Visas Could Aid Graduates

U.S. lawmakers are working toward bipartisan legislation that would offer expedited visas to foreign graduates with advanced technical degrees, amid complaints...

Risky Business
From Communications of the ACM

Risky Business

Governments, companies, and individuals have suffered an unusual number of highly publicized data breaches this year. Is there a solution?

Hacking Cars
From Communications of the ACM

Hacking Cars

Researchers have discovered important security flaws in modern automobile systems. Will car thieves learn to pick locks with their laptops?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account