acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


London Police Use Flickr to Identify Looters
From ACM News

London Police Use Flickr to Identify Looters

As rioting continues to roil the streets of London, local police forces are turning to the Web to help unmask those involved in the torching and looting.  On...

Defcon Opens Its Doors to Pre-Teen and Teen Hackers
From ACM News

Defcon Opens Its Doors to Pre-Teen and Teen Hackers

DefCon, the conference where hackers and the people who monitor them get together to trade the latest in hacking and tracking data, had some new attendees: children...

Mobilizing Help for People Accused of Hacking
From ACM News

Mobilizing Help for People Accused of Hacking

When Senator Joseph R. McCarthy held hearings in the 1950s to question witnesses about their supposed ties to communism, critics accused him of fomenting a Red...

Why Has BlackBerry Been Blamed for the London Riots?
From ACM News

Why Has BlackBerry Been Blamed for the London Riots?

The whole of London is taking stock after outbreaks of violence and looting across the capital. Ealing, Camden, Peckham, Clapham, Lewisham, Woolwich, and Hackney...

From ACM News

Web Tracking Has Become a Privacy Time Bomb

For more than a decade, tracking systems have been taking note of where you go and what you search for on the Web—without your permission. Today many of the personal...

From ACM News

Black Hat: Legal Pitfalls of Investigating Mobile

Hackers today are testing mobile devices ever more strenuously, but the work often stands on shaky legal ground, according to Jennifer Granick, an attorney for...

From ACM News

Your Smartphone: A New Frontier For Hackers

Last week, security researchers uncovered yet another strain of malicious software aimed at smartphones that run Google's popular Android operating system. The...

From ACM News

Your Face

Imagine being able to sit down in a bar, snap a few photos of people, and quickly learn who they are, who their friends are, where they live, what kind of music...

Costly Drone Is Poised to Replace ­-2 Spy Plane
From ACM News

Costly Drone Is Poised to Replace ­-2 Spy Plane

Tucked away here in the Mojave Desert, the assembly plant for the high-flying Global Hawk jet resembles a giant hobby shop. Work tables surround a handful of...

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls
From ACM News

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls

What do you do when the target you’re spying on slips behind his home-security gates and beyond your reach? Launch your personal, specially equipped WASP drone—short...

Can Video Kill the Credit-Card Form?
From ACM News

Can Video Kill the Credit-Card Form?

The days of tediously having to punch in credit-card details whenever you make an online purchase may be numbered, thanks to a new payment system that turns any...

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future
From ACM News

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future

Ever since Google announced that its Android phones would be equipped with a "digital wallet" that allows users to pay for things simply by touching their phone...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...

From ACM News

Operation Shady RAT May Be the Biggest Hack in History but Is No Surprise

Anybody involved in the IT and cybersecurity industry knows that every major industry and government agency around the world is under threat of intrusion through...

From ACM News

Pentagon Seeks a Few Good Social Networkers

The Pentagon is developing plans to use social networking sites like Facebook and Twitter as both a resource and a weapon in future conflicts. Its research and...

Researchers Expose Cunning Online Tracking Service That Can
From ACM News

Researchers Expose Cunning Online Tracking Service That Can

Researchers at U.C. Berkeley have discovered that some of the net's most popular sites are using a tracking service that can't be evaded—even when users block...

Here's How U.s. Spies Will Find You Through Your Pics
From ACM News

Here's How U.s. Spies Will Find You Through Your Pics

Iarpa, the intelligence community’s way-out research shop, wants to know where you took that vacation picture over the Fourth of July. It wants to know where...

Someday Your Brain Could Brake For You
From ACM News

Someday Your Brain Could Brake For You

Many high-end cars today come equipped with brake assist systems, which help a driver use the brakes correctly depending on particular conditions in an emergency...

From ACM News

Document: Fbi Surveillance Geeks Fear, Love New Gadgets

Can't wait for 4G to become the ubiquitous standard for mobile communication? On the edge of your seat for the unveiling of Microsoft's secret Menlo Project and...

What Will We Watch As Drones Evolve?
From ACM News

What Will We Watch As Drones Evolve?

Every week it seems there are reports about U.S. drones—unmanned, remote-controlled aerial vehicles—tracking down suspected terrorists in remote, unreachable...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account