acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Are You Too Paranoid About Digital Privacy, or Not Paranoid Enough?
From ACM Opinion

Are You Too Paranoid About Digital Privacy, or Not Paranoid Enough?

Let's start with one thing you hear over and over again when interviewing people about privacy: "I've got nothing to hide."

Federal Agencies Embrace New Technology and Strategies to Find the Enemy Within
From ACM News

Federal Agencies Embrace New Technology and Strategies to Find the Enemy Within

After years of focusing on outside threats, the federal government and its contractors are turning inward, aiming a range of new technologies and counterintelligence...

DDoS Cyber Attacks Get Bigger, Smarter, More Damaging
From ACM News

DDoS Cyber Attacks Get Bigger, Smarter, More Damaging

Crashing websites and overwhelming data centers, a new generation of cyber attacks is costing millions and straining the structure of the Internet.

Mathematical Proof Reveals How To Make The Internet More Earthquake-Proof
From ACM News

Mathematical Proof Reveals How To Make The Internet More Earthquake-Proof

One of the common myths about the Internet is that it was originally designed during the Cold War to survive nuclear attack.

Designing Robots That Can Keep Secrets
From ACM TechNews

Designing Robots That Can Keep Secrets

Researchers are studying ways to prevent surrogate robots from unnecessarily revealing the identities of the people with whom they interact.

Inside the New Arms Race to Control Bandwidth on the Battlefield
From ACM News

Inside the New Arms Race to Control Bandwidth on the Battlefield

An electromagnetic mystery in northern Iraq changed the course of Jesse Potter's life.

Since It Can't Sue ­s All, Getty Images Embraces Embedded Photos
From ACM News

Since It Can't Sue ­s All, Getty Images Embraces Embedded Photos

For the past decade or so, the best defense Getty Images could find against the right-click button on your mouse—home of the "copy" and "save" functions—has been...

Plan to End U.s. Control of Icann Submitted to Brazil Meeting on the Future of Internet Governance
From ACM TechNews

Plan to End U.s. Control of Icann Submitted to Brazil Meeting on the Future of Internet Governance

Syracuse University researchers have proposed a solution to the U.S. government's ties to the Internet Corporation for Assigned Names and Numbers. 

Russia and ­kraine in Cyber 'stand-Off'
From ACM News

Russia and ­kraine in Cyber 'stand-Off'

As diplomatic efforts are stepped up to ease tensions in Ukraine, security experts have warned that Kiev and Moscow are locked in a cyber stand-off.

Feds Grapple With Big Data vs. Privacy
From ACM TechNews

Feds Grapple With Big Data vs. Privacy

White House counselor John Podesta is leading a 90-day study examining the intersection of big data and privacy. 

N.s.a. Director Says Snowden Leaks Hamper Efforts Against Cyberattacks
From ACM News

N.s.a. Director Says Snowden Leaks Hamper Efforts Against Cyberattacks

Gen. Keith B. Alexander, the director of the National Security Agency, said Tuesday that the leaks by the former agency contractor Edward J. Snowden had slowed...

­kraine Crisis: Cyber War with Russia Heating up
From ACM News

­kraine Crisis: Cyber War with Russia Heating up

If you think the crisis in the Ukraine is limited just to being on the ground, think again.

The Ietf Needed a Wake-Up Call on Security, Says Chairman
From ACM TechNews

The Ietf Needed a Wake-Up Call on Security, Says Chairman

Internet Engineering Task Force members are focusing on security and how to protect users from pervasive monitoring in a meeting that began Sunday in London. 

Report Calls for Better Backstops to Protect Power Grid From Cyberattacks
From ACM TechNews

Report Calls for Better Backstops to Protect Power Grid From Cyberattacks

Despite increasing anxiety over the possibility of a cyberattack on the power grid, the U.S. energy industry and government are ill-equipped to counter the threat...

What Do Data Brokers Know About Me?
From ACM Opinion

What Do Data Brokers Know About Me?

I once ran into a friend and her husband at the playground in our neighborhood in Manhattan.

Experts Urge Conservatism on Crypto Standards
From ACM News

Experts Urge Conservatism on Crypto Standards

Security people are, by nature, cautious and methodical, and that is even more true of cryptographers.

Meet the Seven People Who Hold the Keys to Worldwide Internet Security
From ACM News

Meet the Seven People Who Hold the Keys to Worldwide Internet Security

In a nondescript industrial estate in El Segundo, a boxy suburb in south-west Los Angeles just a mile or two from LAX international airport, 20 people wait in a...

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.
From ACM Opinion

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.

On Friday, what had been the world's leading Bitcoin exchange declared bankrutpcy, claiming that hackers had exploited a technical issue called "transaction malleability...

Draft Language Signals More Transparent Nist
From ACM TechNews

Draft Language Signals More Transparent Nist

The U.S. National Institute of Standards and Technology has released new guidance on cryptographic standards.

DARPA Targets Counterfeit Electronics
From ACM TechNews

DARPA Targets Counterfeit Electronics

The U.S. Defense Advanced Research Projects Agency is developing a tool to verify the trustworthiness of electronic components. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account