acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

­.s. Cyber Approach 'too Predictable' For One Top General

The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History
From ACM News

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

It was January 2010, and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz...

Xbrl Group Offers Cash Prize For Open Source Tools
From ACM TechNews

Xbrl Group Offers Cash Prize For Open Source Tools

XBRL U.S. has created a competition to encourage the development of better tools that work with the Extensible Business Reporting Language (XBRL) standard for financial...

Bradley Manning's Army of One
From ACM News

Bradley Manning's Army of One

How a lonely, five-foot-two, gender-questioning soldier became a WikiLeaks hero, a traitor to the U.S., and one of the most unusual revolutionaries in American...

From ACM News

Former CIA Director: Build a New Internet to Improve Cybersecurity

The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George...

From ACM News

Spies Want to Mine Your Tweets For Signs of the Next Tsunami

The intelligence community has seen the future, and the future is Google Trends. Actually, more like a highly sophisticated version of Google Trends, with Twitter...

Kevin Mitnick Shows How Easy It Is to Hack a Phone
From ACM News

Kevin Mitnick Shows How Easy It Is to Hack a Phone

British tabloid News of the World said it is closing down over a phone hacking scandal in which workers for the Rupert Murdoch-owned newspaper allegedly snooped...

Phone Hacking Can Extend Beyond Voice Mail
From ACM News

Phone Hacking Can Extend Beyond Voice Mail

While the phone hacking by British tabloid News of the World was unexceptional by technical standards, security experts say the scandal portends how the growth...

Safer Skies
From ACM News

Safer Skies

The Federal Aviation Administration (FAA) has mandated that by 2020, all commercial aircraft—and small aircraft flying near most airports—must be equipped with...

Should the Government Need a Search Warrant to Track Your Car with Gps?
From ACM News

Should the Government Need a Search Warrant to Track Your Car with Gps?

The Supreme Court ended its term with a high-profile ruling that violent video games are protected by the First Amendment, but a bigger technology decision could...

From ACM News

How Divorce Lawyers Use Social Networks

Updates you've posted to Facebook and Twitter can present obvious problems when you're searching for a job or starting a new relationship. But a growing number...

Global Tech Leaders Promote Open Internet
From ACM TechNews

Global Tech Leaders Promote Open Internet

The Organization for Economic Co-operation and Development has released a set of 14 policies designed to maintain the Internet as a forum for open communication...

From ACM News

Maryland Sees Its Moment in Cybersecurity

As Fort Meade increasingly becomes a stronghold for federal cybersecurity, Maryland officials and business advocates are trying to take advantage of what they...

From ACM News

Cisco Poised to Help China Keep an Eye on Its Citizens

Western companies, including Cisco Systems Inc., are poised to help build an ambitious new surveillance project in China—a citywide network of as many as 500,000...

From ACM News

Hackers Select a New Target: Other Hackers

The hackers, calling themselves the A-Team, assembled a trove of private information and put it online for all to see: names, aliases, addresses, phone numbers...

Interview with Key Lulzsec Hacker
From ACM News

Interview with Key Lulzsec Hacker

It was early May when LulzSec's profile skyrocketed after a hack on the giant Sony corporation. LulzSec's name comes from Lulz, a corruption of LOL, often denoting...

From ACM News

Bug-Squashing Tools Offered to Improve Network Security

The Department of Homeland Security has announced an initiative to shore up security by squashing software bugs. This follows a slew of high-profile attacks on...

Robert Morris, Pioneer in Computer Security, Dies at 78
From ACM News

Robert Morris, Pioneer in Computer Security, Dies at 78

Robert Morris, a cryptographer who helped developed the Unix computer operating system, which controls an increasing number of the world's computers and touches...

From ACM News

Google Takes On Friend Sprawl

Google Inc. launched its most ambitious social-networking effort yet, broadening a battle with Facebook Inc. to grab the attention of Web users and future advertising...

New Patriot Act Controversy: Is Washington Collecting Your Cell-Phone Data?
From ACM News

New Patriot Act Controversy: Is Washington Collecting Your Cell-Phone Data?

The U.S. Senate Intelligence Committee is weighing fresh concern about the sweeping nature of domestic spying using one controversial section of the Patriot Act...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account