acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How to Sabotage Encryption Software (and Not Get Caught)
From ACM News

How to Sabotage Encryption Software (and Not Get Caught)

In the field of cryptography, a secretly planted "backdoor" that allows eavesdropping on communications is usually a subject of paranoia and dread.

­.n. Report Focuses on Modern Technology to Improve Peacekeeping Missions
From ACM TechNews

­.n. Report Focuses on Modern Technology to Improve Peacekeeping Missions

A new report says United Nations peacekeeping missions should use technology to establish situational awareness, carry out mandates, and protect themselves.

Why Everyone Was Wrong About Net Neutrality
From ACM Opinion

Why Everyone Was Wrong About Net Neutrality

Today, the Federal Communications Commission, by a vote of three to two, enacted its strongest-ever rules on net neutrality, preserving an open Internet by prohibiting...

Surveillance-Based Manipulation: How Facebook or Google Could Tilt Elections
From ACM Opinion

Surveillance-Based Manipulation: How Facebook or Google Could Tilt Elections

Someone who knows things about us has some measure of control over us, and someone who knows everything about us has a lot of control over us.

How Madden Ratings Are Made
From ACM Careers

How Madden Ratings Are Made

Hunched over a keyboard, surrounded by computer monitors, Donny Moore, 37, controls the fate of the National Football League.

How Safe Are Perl, Php, and Ruby? The Experts Weigh In
From ACM TechNews

How Safe Are Perl, Php, and Ruby? The Experts Weigh In

Many developers of programming languages are quick to defend the security of their language. 

­S Government and Private Sector Developing 'precrime' System to Anticipate Cyber-Attacks
From ACM News

­S Government and Private Sector Developing 'precrime' System to Anticipate Cyber-Attacks

The USA's Office of the Director of National Intelligence (ODNI) is soliciting the involvement of the private and academic sectors in developing a new 'precrime'...

How the Military Will Fight Isis on the Dark Web
From ACM News

How the Military Will Fight Isis on the Dark Web

The Dark Web is not so much a place as it is a method of achieving a level of anonymity online.

Surprise! America Already Has a Manhattan Project For Developing Cyber Attacks
From ACM News

Surprise! America Already Has a Manhattan Project For Developing Cyber Attacks

"What we really need is a Manhattan Project for cybersecurity." It's a sentiment that swells up every few years in the wake of some huge computer intrusion—most...

More Watchful Eye Needed on 'dark Web' and Cybercriminal Activities, Notes New Paper
From ACM TechNews

More Watchful Eye Needed on 'dark Web' and Cybercriminal Activities, Notes New Paper

New research calls for increased monitoring of the Dark Web by security researchers and government investigators. 

Building a Face, and a Case, on Dna
From ACM News

Building a Face, and a Case, on Dna

There were no known eyewitnesses to the murder of a young woman and her 3-year-old daughter four years ago. No security cameras caught a figure coming or going.

Experts: Infrastructure 'legitimate Target' in Battle For Cyber Supremacy
From ACM TechNews

Experts: Infrastructure 'legitimate Target' in Battle For Cyber Supremacy

The leaders of the U.S. Defense Department, National Security Agency, and Cyber Command have all warned of the potential for a cyber 9/11.

Document Reveals Growth of Cyberwarfare Between the ­.S. and Iran
From ACM News

Document Reveals Growth of Cyberwarfare Between the ­.S. and Iran

A newly disclosed National Security Agency document illustrates the striking acceleration of the use of cyberweapons by the United States and Iran against eachnuclear...

Social Network Analysis Privacy Tackled
From ACM TechNews

Social Network Analysis Privacy Tackled

Pennsylvania State University researchers are researching ways to maintain privacy on social networks.

Python For Beginners
From Communications of the ACM

Python For Beginners

A survey found the language in use in introductory programming classes in the top U.S. computer science schools.

Internet of Dna
From ACM News

Internet of Dna

Noah is a six-year-old suffering from a disorder without a name.

Meet Kevin Ashton, Father of the Internet of Things
From ACM Careers

Meet Kevin Ashton, Father of the Internet of Things

The Internet of Things started in the mid-1990s, when a quirky young brand manager in the U.K. puzzled over why a shade of brown lipstick kept disappearing from...

Poor Decision-Making Can Lead to Cybersecurity Breaches
From ACM TechNews

Poor Decision-Making Can Lead to Cybersecurity Breaches

Michigan State University professor Rick Walsh is studying the reasoning process behind the decisions people make that lead to computer security breaches. 

Spies Can Track You Just By Watching Your Phone's Power ­se
From ACM TechNews

Spies Can Track You Just By Watching Your Phone's Power ­se

A new paper from a team of researchers found it is possible to determine an Android phone's location and movement by monitoring and analyzing its power consumption...

Secrets Become History: Edward Snowden in Citizenfour Wins Documentary Oscar
From ACM Opinion

Secrets Become History: Edward Snowden in Citizenfour Wins Documentary Oscar

Citizenfour is filmmaker Laura Poitras' account of the first meetings between herself, Glenn Greenwald, and Edward Snowden.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account