acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


China Draft Counterterror Law Strikes Fear in Foreign Tech Firms
From ACM Careers

China Draft Counterterror Law Strikes Fear in Foreign Tech Firms

China is weighing a far-reaching counterterrorism law that would require technology firms to hand over encryption keys and install security "backdoors", a potential...

How to Sabotage Encryption Software (and Not Get Caught)
From ACM News

How to Sabotage Encryption Software (and Not Get Caught)

In the field of cryptography, a secretly planted "backdoor" that allows eavesdropping on communications is usually a subject of paranoia and dread.

Surveillance-Based Manipulation: How Facebook or Google Could Tilt Elections
From ACM Opinion

Surveillance-Based Manipulation: How Facebook or Google Could Tilt Elections

Someone who knows things about us has some measure of control over us, and someone who knows everything about us has a lot of control over us.

How Safe Are Perl, Php, and Ruby? The Experts Weigh In
From ACM TechNews

How Safe Are Perl, Php, and Ruby? The Experts Weigh In

Many developers of programming languages are quick to defend the security of their language. 

­S Government and Private Sector Developing 'precrime' System to Anticipate Cyber-Attacks
From ACM News

­S Government and Private Sector Developing 'precrime' System to Anticipate Cyber-Attacks

The USA's Office of the Director of National Intelligence (ODNI) is soliciting the involvement of the private and academic sectors in developing a new 'precrime'...

How the Military Will Fight Isis on the Dark Web
From ACM News

How the Military Will Fight Isis on the Dark Web

The Dark Web is not so much a place as it is a method of achieving a level of anonymity online.

Surprise! America Already Has a Manhattan Project For Developing Cyber Attacks
From ACM News

Surprise! America Already Has a Manhattan Project For Developing Cyber Attacks

"What we really need is a Manhattan Project for cybersecurity." It's a sentiment that swells up every few years in the wake of some huge computer intrusion—most...

The Four Main Roadblocks Holding ­p Self-Driving Cars
From ACM TechNews

The Four Main Roadblocks Holding ­p Self-Driving Cars

There are four major obstacles facing developers of autonomous vehicles. 

More Watchful Eye Needed on 'dark Web' and Cybercriminal Activities, Notes New Paper
From ACM TechNews

More Watchful Eye Needed on 'dark Web' and Cybercriminal Activities, Notes New Paper

New research calls for increased monitoring of the Dark Web by security researchers and government investigators. 

Spy Research Agency Is Building Psychic Machines to Predict Hacks
From ACM TechNews

Spy Research Agency Is Building Psychic Machines to Predict Hacks

The U.S. Intelligence Advanced Research Projects Activity is working on a new contest aimed at creating a system to predict cyberthreats a network may face ahead...

Building a Face, and a Case, on Dna
From ACM News

Building a Face, and a Case, on Dna

There were no known eyewitnesses to the murder of a young woman and her 3-year-old daughter four years ago. No security cameras caught a figure coming or going.

Experts: Infrastructure 'legitimate Target' in Battle For Cyber Supremacy
From ACM TechNews

Experts: Infrastructure 'legitimate Target' in Battle For Cyber Supremacy

The leaders of the U.S. Defense Department, National Security Agency, and Cyber Command have all warned of the potential for a cyber 9/11.

Document Reveals Growth of Cyberwarfare Between the ­.S. and Iran
From ACM News

Document Reveals Growth of Cyberwarfare Between the ­.S. and Iran

A newly disclosed National Security Agency document illustrates the striking acceleration of the use of cyberweapons by the United States and Iran against eachnuclear...

Social Network Analysis Privacy Tackled
From ACM TechNews

Social Network Analysis Privacy Tackled

Pennsylvania State University researchers are researching ways to maintain privacy on social networks.

Python For Beginners
From Communications of the ACM

Python For Beginners

A survey found the language in use in introductory programming classes in the top U.S. computer science schools.

Car Talk
From Communications of the ACM

Car Talk

Vehicle-to-vehicle communication is coming. Are we ready for it?

Automating Organic Synthesis
From Communications of the ACM

Automating Organic Synthesis

A machine that could create organic molecules on demand awaits appropriate software and analytical components.

Internet of Dna
From ACM News

Internet of Dna

Noah is a six-year-old suffering from a disorder without a name.

Meet Kevin Ashton, Father of the Internet of Things
From ACM Careers

Meet Kevin Ashton, Father of the Internet of Things

The Internet of Things started in the mid-1990s, when a quirky young brand manager in the U.K. puzzled over why a shade of brown lipstick kept disappearing from...

Poor Decision-Making Can Lead to Cybersecurity Breaches
From ACM TechNews

Poor Decision-Making Can Lead to Cybersecurity Breaches

Michigan State University professor Rick Walsh is studying the reasoning process behind the decisions people make that lead to computer security breaches. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account