acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Nsa Says How Often, Not When, It Discloses Software Flaws
From ACM News

Nsa Says How Often, Not When, It Discloses Software Flaws

The U.S. National Security Agency, seeking to rebut accusations that it hoards information about vulnerabilities in computer software, thereby leaving U.S. companies...

Same Rhetoric Permeates Going Dark Encryption Debate
From ACM News

Same Rhetoric Permeates Going Dark Encryption Debate

The Going Dark encryption debate surfaced again on Wednesday at a small security conference here, and as in previous iterations before larger technical audiences...

Cerf Cites Challenges Facing the Internet of Things
From ACM News

Cerf Cites Challenges Facing the Internet of Things

Moving the Internet of Things forward will require, among other things, standards, the ability to configure massive numbers of devices, and a healthy dose of paranoia...

Could Your Social Media Footprint Step On Your Credit History?
From ACM News

Could Your Social Media Footprint Step On Your Credit History?

In December 1912, financier John Pierpont "J.P." Morgan testified in Washington before the Bank and Currency Committee of the House of Representatives investigating...

Net of Insecurity: The Kernel of the Argument
From ACM TechNews

Net of Insecurity: The Kernel of the Argument

The Linux operating system has come to dominate the online world, but critics increasingly warn of security weaknesses that should have been corrected long ago. ...

America's Crypto Battles
From ACM Opinion

America's Crypto Battles

John Miller reckons he can get into pretty much any safe.

How Scientists Search the Cosmos For Encrypted Alien Signals (and Other Ones Too)
From ACM News

How Scientists Search the Cosmos For Encrypted Alien Signals (and Other Ones Too)

In a recent conversation with National Security Agency whistleblower Edward Snowden, astrophysicist Neil deGrasse Tyson asked about communication with alien civilizations...

­.s. Tech Giants May Blur National Security Boundaries in China Deals
From ACM News

­.s. Tech Giants May Blur National Security Boundaries in China Deals

One Chinese technology company receives crucial technical guidance from a former People's Liberation Army rear admiral. Another company developed the electronics...

Closing the Last Loophole For ­nhackable Quantum Security
From ACM TechNews

Closing the Last Loophole For ­nhackable Quantum Security

The perfection of device-independent quantum cryptography will enable devices that guarantee the messages sent on them remain confidential. 

Email Encryption Is Broken
From ACM TechNews

Email Encryption Is Broken

A new study has found technology designed to encrypt and authenticate emails is ineffective.

Tor Just Launched the Easiest App Yet For Anonymous, Encrypted Im
From ACM News

Tor Just Launched the Easiest App Yet For Anonymous, Encrypted Im

The anonymity network Tor has long been the paranoid standard for privacy online, and the Tor Browser that runs on it remains the best way to use the web while...

A Quick Guide to the Cybersecurity Bill Passed By the ­.s. Senate
From ACM News

A Quick Guide to the Cybersecurity Bill Passed By the ­.s. Senate

After more than a year of bickering, stalling and revising, the Senate passed its most significant cybersecurity bill to date 74–21.

A Basis For All Cryptography
From ACM TechNews

A Basis For All Cryptography

The inability to practically apply indistinguishability obfuscation to deliver secure cryptography may be mitigated with an efficient method for functional encryption...

Everything You Need to Know About the Vast ­ndersea Network that Makes the Internet Work
From ACM News

Everything You Need to Know About the Vast ­ndersea Network that Makes the Internet Work

Russians submarines and spy ships are "ggressively operating" near the undersea cables that are the backbone of the global Internet—worrying some U.S. intelligence...

It's Not Just Vw: A Robust Market For Reprogramming Vehicles
From ACM News

It's Not Just Vw: A Robust Market For Reprogramming Vehicles

Lawmakers want to know more about Volkswagen's massive cheat—how the automaker used software to crank up the power on a vehicle, and then hide the fact.

­ab Research Studies Cyberattacks Through the Lens of Eeg and Eye Tracking
From ACM TechNews

­ab Research Studies Cyberattacks Through the Lens of Eeg and Eye Tracking

Researchers from the University of Alabama at Birmingham recently presented a study about users' susceptibility to, and ability to detect, certain cyberattacks. ...

How Emojis Find Their Way to Phones
From ACM TechNews

How Emojis Find Their Way to Phones

The Unicode Consortium, founded in the late 1980s to create a standardized code for text characters, is attracting interest as the arbiter of new emojis. 

Image Too Good to Be True? DARPA Program Targets Image Doctoring
From ACM TechNews

Image Too Good to Be True? DARPA Program Targets Image Doctoring

The U.S. Defense Advanced Research Projects Agency wants to develop an easy-to-use toolset to detect altered images.

Researchers Aim to Make Privacy Second Nature For Software Developers
From ACM TechNews

Researchers Aim to Make Privacy Second Nature For Software Developers

A New York University researcher and colleagues are working to make user privacy an integral part of the software development process. 

Companies Proactively Seek Out Internal Threats
From Communications of the ACM

Companies Proactively Seek Out Internal Threats

Organizations must balance their concerns with the protection of employee privacy.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account