acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Government Aims to Build a 'Data Eye in the Sky'

More than 60 years ago, in his "Foundation" series, the science fiction novelist Isaac Asimov invented a new science—psychohistory—that combined mathematics and...

From ACM News

Patent Lawyer Demand Rises Following ­.s. Legislative Overhaul

 Patent attorneys, who typically have degrees in fields such as engineering as well as law, are in such demand that their specialty may account for more than 15...

From ACM News

Coming Soon: The Drone Arms Race

At the Zhuhai air show in southeastern China last November, Chinese companies startled some Americans by unveiling 25 different models of remotely controlled aircraft...

From ACM News

White House Orders New Computer Security Rules

The White House plans to issue an executive order on Friday to replace a flawed patchwork of computer security safeguards exposed by the disclosure of hundreds...

From ACM News

How Many Security Clearances Have Been Issued?

More than 4.2 million people have security clearances for access to classified information, a number that vastly outstrips previous estimates and nearly rivals...

Idaho Lab in a Race to Shore Up Critical Infrastructure Systems
From ACM News

Idaho Lab in a Race to Shore Up Critical Infrastructure Systems

All it took was one click of a mouse from the CEO of the ACME Chemical company.

Army Tracking Plan: Drones That Never Forget a Face
From ACM News

Army Tracking Plan: Drones That Never Forget a Face

Perhaps the idea of spy drones already makes your nervous. Maybe you’re uncomfortable with the notion of an unblinking, robotic eye in the sky that can watch...

A Plaything of Powerful Nations
From ACM TechNews

A Plaything of Powerful Nations

The latest United Nations-sponsored Internet Governance Forum provided insight on how the Internet is being handled on a global scale. 

Supreme Court Docket: Surveillance, Profanity, and Thought Patents
From ACM News

Supreme Court Docket: Surveillance, Profanity, and Thought Patents

The Supreme Court’s 2011–2012 term began Oct. 3 with arguments on the docket concerning everything from television profanity to warrantless GPS surveillance.

From ACM News

On the Front Line Against the Next Stuxnet

Something has gone terribly wrong on the plant floor at ACME Specialty Chemical International Inc.

From ACM News

What to Do If You've Been Hacked

It's a nightmare scenario every business fears. Your tech department has spotted suspicious activity on the company network. Your customers and employees are...

Which Telecoms Store Your Data the Longest? Secret Memo Tells All
From ACM News

Which Telecoms Store Your Data the Longest? Secret Memo Tells All

The nation’s major mobile-phone providers are keeping a treasure trove of sensitive data on their customers, according to newly released Justice Department internal...

Dealing With an Identity Hijacked on the Online Highway
From ACM News

Dealing With an Identity Hijacked on the Online Highway

Despite his prominent position as a Republican candidate for president, Rick Santorum has lost control of his online identity. And for all the snickering online...

From ACM News

In China, Business Travelers Take Extreme Precautions to Avoid Cyber-Espionage

Packing for business in China? Bring your passport and business cards, but maybe not that laptop loaded with contacts and corporate memos.

Will Super Wi-Fi Live ­p to Its Name?
From ACM News

Will Super Wi-Fi Live ­p to Its Name?

It's likely that a few years from now, Americans' laptops, smart phones, and other wireless devices will be able to get online using "Super Wi-Fi," a new standard...

The 'worm' That Could Bring Down the Internet
From ACM Opinion

The 'worm' That Could Bring Down the Internet

For the past three years, a highly encrypted computer worm called Conficker has been spreading rapidly around the world. As many as 12 million computers have...

From ACM News

Dhs Thinks Some Scada Problems Are Too Big To Call "bug"

The Stuxnet worm may be the most famous piece of malicious software ever written. When it was first detected, a little over a year ago, the worm sounded a warning...

Security Expert: ­.s. 'leading Force' Behind Stuxnet
From ACM News

Security Expert: ­.s. 'leading Force' Behind Stuxnet

German cybersecurity expert Ralph Langner warns that U.S. utility companies are not yet prepared to deal with the threat presented by the Stuxnet computer worm...

Net Neutrality Rules Published, Lawsuits Soon to Follow
From ACM News

Net Neutrality Rules Published, Lawsuits Soon to Follow

The FCC has finally officially published long-delayed rules prohibiting cable, DSL, and wireless internet companies from blocking Web sites and requiring them...

From ACM News

Setting Boundaries For Internet Privacy

Watchful European privacy regulators are wielding increasing influence beyond the Continent’s borders.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account