acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


While Warning of Chinese Cyberthreat, ­.s. Launches Its Own Attack
From ACM Opinion

While Warning of Chinese Cyberthreat, ­.s. Launches Its Own Attack

The U.S. government has long complained about Chinese hacking and cyberattacks, but new documents show that the National Security Agency managed to penetrate the...

Fact or Fiction?: Your Car Is Hackable
From ACM News

Fact or Fiction?: Your Car Is Hackable

When your home computer is hacked, the things at risk are your identity, finances and other digital assets.

Microsoft Builds a Digital 'monkey' to Hunt Fraudulent Ads
From ACM TechNews

Microsoft Builds a Digital 'monkey' to Hunt Fraudulent Ads

Researchers have developed technology, known as a digital monkey, that can detect and counter fraudulent advertisements on a large scale. 

Pay with Your Fingerprint
From ACM News

Pay with Your Fingerprint

Anyone with an iPhone 5 can use its fingerprint reader to unlock the device and pay for apps or music in Apple's iTunes store.

How Gmail Happened: The Inside Story of Its Launch 10 Years Ago Today
From ACM News

How Gmail Happened: The Inside Story of Its Launch 10 Years Ago Today

If you wanted to pick a single date to mark the beginning of the modern era of the web, you could do a lot worse than choosing Thursday, April 1, 2004, the day...

Experts Say Nsa Rules Leave Privacy Vulnerable
From ACM TechNews

Experts Say Nsa Rules Leave Privacy Vulnerable

Cybersecurity experts doubt U.S. President Barack Obama's assurance the U.S. National Security Agency is not spying on ordinary Americans' communications.

Nsa Infiltrated Rsa Security More Deeply Than Thought  Study
From ACM News

Nsa Infiltrated Rsa Security More Deeply Than Thought Study

Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's...

Open Enigma Project Makes Encryption Machines Accessible
From ACM News

Open Enigma Project Makes Encryption Machines Accessible

Enigma machines have captivated everyone from legendary code breaker Alan Turing and the dedicated cryptographers from England's Bletchley Park to historians and...

Search For Lost Jet Is Complicated By Geopolitics and Rivalries
From ACM News

Search For Lost Jet Is Complicated By Geopolitics and Rivalries

The frantic hunt for Malaysia Airlines Flight 370 has been, in one way, a nearly miraculous display of international collaboration: 26 nations, many of them rivals...

How the Nsa Would Get Phone Data ­nder Obama Administration's New Plan
From ACM News

How the Nsa Would Get Phone Data ­nder Obama Administration's New Plan

One of the key points in the "fact sheet" that the White House published today about its plan to end the NSA's bulk collection of phone record data is that while...

Consortium Wants Standards For 'internet of Things'
From ACM News

Consortium Wants Standards For 'internet of Things'

Attention: Internet of Things. For better or worse, big boys are in the room.

Justice Scalia Looks Forward to Hearing Nsa Spying Case
From ACM News

Justice Scalia Looks Forward to Hearing Nsa Spying Case

Justice Antonin Scalia signaled during a law school talk on March 21 that the Supreme Court is very much aware that legal challenges to the National Security Agency's...

Don't Let Personal Data Escape Your Smartphone
From ACM TechNews

Don't Let Personal Data Escape Your Smartphone

Ecole Polytechnique Federale de Lausanne researchers have developed an application that automatically secures shared information on a mobile phone. 

All Android Devices at Risk of Being Hacked When Installing Os System ­pdates
From ACM TechNews

All Android Devices at Risk of Being Hacked When Installing Os System ­pdates

Security researchers have uncovered a new class of vulnerabilities in the Android operating system. 

­niversity of Twente Tool Makes Scanning the Internet For Illegal Images Possible
From ACM TechNews

­niversity of Twente Tool Makes Scanning the Internet For Illegal Images Possible

A new system makes it possible to scan Internet traffic for illegal photographs without infringing on users' privacy rights. 

DARPA to Mine 'big Code' to Improve Software Reliability
From ACM TechNews

DARPA to Mine 'big Code' to Improve Software Reliability

The U.S. Defense Advanced Research Projects Agency seeks to address the software defects that underlie most system errors and security vulnerabilities.

Newest Bug Bounty Touts $10K Rewards, Appeals for Help in Finding Flash Flaws
From ACM TechNews

Newest Bug Bounty Touts $10K Rewards, Appeals for Help in Finding Flash Flaws

The Internet Bug Bounty program recently paid $10,000 each to a pair of security researchers for vulnerabilities they found in Flash. 

Mugshots Built from Dna Data
From ACM News

Mugshots Built from Dna Data

Leaving a hair at a crime scene could one day be as damning as leaving a photograph of your face.

Csus Students Get Federal Scholarships to Become Tech Warriors
From ACM TechNews

Csus Students Get Federal Scholarships to Become Tech Warriors

California State University, Sacramento is offering $25,000 annual scholarships as part of the CyberCorps program. 

A 'crisis' in Online Ads: One-Third of Traffic Is Bogus
From ACM News

A 'crisis' in Online Ads: One-Third of Traffic Is Bogus

Billions of dollars are flowing into online advertising. But marketers also are confronting an uncomfortable reality: rampant fraud.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account