acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hbo's John Oliver Hits Snowden Hard on Nsa Leaks
From ACM Opinion

Hbo's John Oliver Hits Snowden Hard on Nsa Leaks

Edward Snowden and an unlikely interviewer squared-off on HBO over the leaks that exposed the National Security Agency's extensive surveillance programs.

Study Shows People Act to Protect Privacy When Told How Often Phone Apps Share Personal Information
From ACM TechNews

Study Shows People Act to Protect Privacy When Told How Often Phone Apps Share Personal Information

Smartphone users will limit the information to which their smartphone apps have access, when they learn how frequently their information is shared with these apps...

Novel Graph Method Detects Cyberattack Patterns in Complex Computing Networks
From ACM TechNews

Novel Graph Method Detects Cyberattack Patterns in Complex Computing Networks

Scientists have developed a framework allowing users to categorize cyberattacks as graph patterns. 

­ab Rolls Out New Technology to Help ­sers Combat Mobile Malware Attacks
From ACM TechNews

­ab Rolls Out New Technology to Help ­sers Combat Mobile Malware Attacks

University of Alabama at Birmingham researchers say they have developed new techniques to prevent sophisticated malware from attacking smartphones. 

Google’s Project Zero Aims to 'improve Security Across the Internet'
From ACM News

Google’s Project Zero Aims to 'improve Security Across the Internet'

Google has assembled 'the best practically-minded security researchers' to 'significantly reduce the number of people harmed by targeted attacks.'

Toolkits For the Mind
From ACM Opinion

Toolkits For the Mind

When the Japanese computer scientist Yukihiro Matsumoto decided to create Ruby, a programming language that has helped build Twitter, Hulu, and much of the modern...

U.s. Establishes Sanctions Program to Combat Cyberattacks, Cyberspying
From ACM News

U.s. Establishes Sanctions Program to Combat Cyberattacks, Cyberspying

President Obama on Wednesday signed an executive order establishing the first sanctions program to allow the administration to impose penalties on individuals overseas...

Stanford Crypto Expert Dan Boneh Wins $175k Computer Science Award
From ACM TechNews

Stanford Crypto Expert Dan Boneh Wins $175k Computer Science Award

Stanford University professor Dan Boneh's contributions to cryptography have earned him the 2014 ACM-Infosys Foundation Award in Computing Sciences.

Probing the Whole Internet For Weak Spots
From ACM TechNews

Probing the Whole Internet For Weak Spots

When the FREAK encryption flaw was uncovered in early March, a team of researchers used a special tool to scan the entire Internet to identify vulnerable websites...

After Snowden, the Nsa Faces Recruitment Challenge
From ACM Careers

After Snowden, the Nsa Faces Recruitment Challenge

Daniel Swann is exactly the type of person the National Security Agency would love to have working for it.

­.s. Supreme Court: Gps Trackers Are a Form of Search and Seizure
From ACM News

­.s. Supreme Court: Gps Trackers Are a Form of Search and Seizure

If the government puts a GPS tracker on you, your car, or any of your personal effects, it counts as a search—and is therefore protected by the Fourth Amendment...

The Healing Power of Your Own Medical Records
From ACM News

The Healing Power of Your Own Medical Records

Steven Keating's doctors and medical experts view him as a citizen of the future.

Dump ­ser Names, Says Dartmouth Research
From ACM TechNews

Dump ­ser Names, Says Dartmouth Research

A joint academic and industry research team has found that two-factor authentication schemes depending on user names and passwords are inherently flawed. 

Germanwings Flight 9525, Technology, and the Question of Trust
From ACM Opinion

Germanwings Flight 9525, Technology, and the Question of Trust

Shortly before the dreadful crash of Germanwings Flight 9525, I happened to be reading part of "The Second Machine Age," a book by two academics at M.I.T., Erik...

Does Your Password Pass Muster?
From ACM TechNews

Does Your Password Pass Muster?

New research raises concerns about the effectiveness of password strength meters, the bars that turn red, yellow, or green to rate the strength of new passwords...

Hoax-Detecting Software Spots Fake Papers
From ACM TechNews

Hoax-Detecting Software Spots Fake Papers

Software programs that generate nonsense computer science papers have become sources of embarrassment for major academic publishers.

Nvidia's Powerful New Computer Helps Teach Cars to Drive
From ACM News

Nvidia's Powerful New Computer Helps Teach Cars to Drive

As cars get smarter and creep ever-closer to driving themselves, the software that makes infotainment systems and adaptive cruise control work is becoming as important...

The Smartest Hackers in the Room (hint: They're Not the Humans)
From ACM TechNews

The Smartest Hackers in the Room (hint: They're Not the Humans)

Teams from around the world will engage in a dress rehearsal next month for the U.S. Pentagon's Cyber Grand Challenge, a competition to develop automated hacker...

Why Kevin Mitnick, the World's Most Notorious Hacker, Is Still Breaking Into Computers
From ACM Careers

Why Kevin Mitnick, the World's Most Notorious Hacker, Is Still Breaking Into Computers

Look no further than Kevin Mitnick's business card to see how some things never change.

Iarpa Preps Insider Threat-Monitoring Projects
From ACM TechNews

Iarpa Preps Insider Threat-Monitoring Projects

The U.S. intelligence community wants to develop insider threat-monitoring systems and new techniques for predicting cyberattacks. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account