acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Microsoft Declares Webgl 'harmful' to Security
From ACM TechNews

Microsoft Declares Webgl 'harmful' to Security

Some researchers say that WebGL, a universal three-dimensional Web graphics standard that has been widely anticipated by Web programmers, could lead to significant...

Internet Body Throws Open Domain Names; .anything
From ACM TechNews

Internet Body Throws Open Domain Names; .anything

ICANN has voted to allow individuals and companies to apply to create new generic top-level domains using almost any word in any language. This means that individuals...

Seven Questions For Iridium Ceo Matthew Desch
From ACM Opinion

Seven Questions For Iridium Ceo Matthew Desch

More often than not, the Iridium satellite phone system is remembered as one of the great telecom flameouts of the 1990s. It almost became a literal one: At one...

War Evolves With Drones, Some Tiny as Bugs
From ACM News

War Evolves With Drones, Some Tiny as Bugs

Two miles from the cow pasture where the Wright Brothers learned to fly the first airplanes, military researchers are at work on another revolution in the air...

How Much Spam Does Your Company ­nknowingly Send?
From ACM News

How Much Spam Does Your Company ­nknowingly Send?

SpamRankings.net uses "name and shame" to publicize organizations that are infected by spam bots.

From ACM News

Legislation Criminalizing Creation of Computer Viruses Enacted

Japan's parliament enacted legislation Friday criminalizing the creation or distribution of computer viruses to crack down on the growing problem of cybercrimes...

Firms Adjust to Hacks
From ACM News

Firms Adjust to Hacks

When email-marketing firm Epsilon Data Management discovered in March that hackers had stolen consumer email addresses it maintains for major banks and retailers...

From ACM News

Internet Braces For New Addresses Beyond '.com,' Including '.bank,' '.eco' and '.canon.'

The organization that oversees the Internet address system is preparing to open the floodgates to a nearly limitless selection of new Web-site suffixes, including...

From ACM News

Full-Field Implementation of a Perfect Eavesdropper on a Quantum Cryptography System

Quantum key distribution allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality...

From ACM News

All Your Bitcoins Are Ours

Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...

From ACM News

Can Wireless Networks Support the Promise of the 'cloud'?

Google, Apple, and Amazon are pushing more and more of your entertainment, your data—heck, your life—into the cloud. But what's it mean for the wireless network...

Nasa Spacecraft Confirms Theories, Sees Surprises at Mercury
From ACM News

Nasa Spacecraft Confirms Theories, Sees Surprises at Mercury

NASA scientists are making new discoveries about the planet Mercury. Data from MESSENGER, the first spacecraft to orbit Mercury, is giving scientists important...

Protecting Medical Implants from Attack
From ACM News

Protecting Medical Implants from Attack

Millions of Americans have implantable medical devices, from pacemakers and defibrillators to brain stimulators and drug pumps; worldwide, 300,000 more people...

From ACM News

Government in Cyber Fight but Can't Keep Up

The Pentagon is about to roll out an expanded effort to safeguard its contractors from hackers and is building a virtual firing range in cyberspace to test new...

From ACM News

Google Voice Search Offers Natural User Input

Google Voice Search for desktop computers isn't much more than the company porting a technology that's been on mobile phones for a while to PCs. But don't write...

Kissinger, Huntsman: ­.s., China Need Cyber Detente
From ACM TechNews

Kissinger, Huntsman: ­.s., China Need Cyber Detente

The United States and China need to forge an agreement restricting cyberattacks and designating some areas as out of bounds to hacking, say former U.S. Secretary...

F.b.i. Agents Get Leeway to Push Privacy Bounds
From ACM News

F.b.i. Agents Get Leeway to Push Privacy Bounds

The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household...

Bitcoin: The Hacker Currency That's Taking Over the Web
From ACM News

Bitcoin: The Hacker Currency That's Taking Over the Web

Global, private and untraceable, it's the monetary system of choice for libertarians, geeks, businesspeople, and, apparently, drug kingpins.

From ACM TechNews

Making Quantum Cryptography Truly Secure

An overlooked loophole in quantum key distribution technology was demonstrated by an eavesdropping method created and operated by researchers at the National University...

Has Facebook Peaked?
From ACM News

Has Facebook Peaked?

Facebook's active user base grew by only 1.7% in May. That's about half its usual growth rate, and it came after similarly slow growth in April. According to Inside...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account