acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How Much Spam Does Your Company ­nknowingly Send?
From ACM News

How Much Spam Does Your Company ­nknowingly Send?

SpamRankings.net uses "name and shame" to publicize organizations that are infected by spam bots.

From ACM News

All Your Bitcoins Are Ours

Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...

New Software Improves the Maintenance and Management of Forests
From ACM TechNews

New Software Improves the Maintenance and Management of Forests

Forests could receive better maintenance and management using new software developed by a team at the Polytechnic University of Valencia. The software is designed...

Protecting Medical Implants from Attack
From ACM News

Protecting Medical Implants from Attack

Millions of Americans have implantable medical devices, from pacemakers and defibrillators to brain stimulators and drug pumps; worldwide, 300,000 more people...

From ACM News

Government in Cyber Fight but Can't Keep Up

The Pentagon is about to roll out an expanded effort to safeguard its contractors from hackers and is building a virtual firing range in cyberspace to test new...

'smart Cars' That Are Actually, Well, Smart
From ACM TechNews

'smart Cars' That Are Actually, Well, Smart

MIT researchers are developing an intelligent transportation system algorithm that factors in models of human driving behavior to warn drivers of potential collisions...

Kissinger, Huntsman: ­.s., China Need Cyber Detente
From ACM TechNews

Kissinger, Huntsman: ­.s., China Need Cyber Detente

The United States and China need to forge an agreement restricting cyberattacks and designating some areas as out of bounds to hacking, say former U.S. Secretary...

F.b.i. Agents Get Leeway to Push Privacy Bounds
From ACM News

F.b.i. Agents Get Leeway to Push Privacy Bounds

The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household...

Bitcoin: The Hacker Currency That's Taking Over the Web
From ACM News

Bitcoin: The Hacker Currency That's Taking Over the Web

Global, private and untraceable, it's the monetary system of choice for libertarians, geeks, businesspeople, and, apparently, drug kingpins.

Has Facebook Peaked?
From ACM News

Has Facebook Peaked?

Facebook's active user base grew by only 1.7% in May. That's about half its usual growth rate, and it came after similarly slow growth in April. According to Inside...

From ACM News

Who Is Behind the Hacks?

Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...

Thieves Found Citigroup Site an Easy Entry
From ACM News

Thieves Found Citigroup Site an Easy Entry

Think of it as a mansion with a high-tech security system—but the front door wasn’t locked tight.

Computer Studies Made Cool, on Film and Now on Campus
From ACM News

Computer Studies Made Cool, on Film and Now on Campus

When Keila Fong arrived at Yale, she had never given much thought to computer science. But then last year everyone on campus started talking about the film "The...

We've Bin Watching You!
From ACM TechNews

We've Bin Watching You!

With Bincam, Newcastle University computer scientists have used a camera phone and Facebook to introduce an element of competition to recycling and minimizing waste...

Dawn Captures Video on Approach to Asteroid Vesta
From ACM News

Dawn Captures Video on Approach to Asteroid Vesta

Scientists working with NASA's Dawn spacecraft have created a new video showing the giant asteroid Vesta as the spacecraft approaches this unexplored world in...

From ACM TechNews

Future of Virtual Reality: What Pregnancy Feels Like

Men can gain a better understanding of what women experience during pregnancy by wearing a new device developed at the Japan Advanced Institute of Science and Technology...

­.s. ­nderwrites Internet Detour Around Censors
From ACM News

­.s. ­nderwrites Internet Detour Around Censors

The Obama administration is leading a global effort to deploy "shadow" Internet and mobile phone systems that dissidents can use to undermine repressive governments...

From ACM News

Why There's No Nobel Prize in Computing

When Nobel Prizes are dished out each fall, the most accomplished professionals in computing, telecom, and IT have usually been left out in the cold. That's...

Army Seeks Social Media Gurus to Save Afghan War
From ACM News

Army Seeks Social Media Gurus to Save Afghan War

Know how to Tweet? Or how to put words into the mouths of foreign security functionaries? If so, the U.S. Army wants you to help un-quagmire the Afghanistan war...

Tracking Down Twitter's Best Rumor Spreaders
From ACM News

Tracking Down Twitter's Best Rumor Spreaders

Sometimes it's easy to know which messages will spread through Twitter like wildfire. Just ask Rep. Anthony Weiner (D-New York), who faces pressure to resign...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account