acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Target Got Hacked Hard in 2005. Here's Why They Let It Happen Again
From ACM News

Target Got Hacked Hard in 2005. Here's Why They Let It Happen Again

A gang of shadowy hackers tears through the systems of big-box retailers, making off with millions of credit and debit card numbers in a matter of weeks and generating...

Public Remains 'All Over the Map' on NSA Tactics
From ACM News

Public Remains 'All Over the Map' on NSA Tactics

President Barack Obama isn't the only one struggling to balance national security and civil liberties with the country's post-Sept. 11 surveillance programs.

Cyberwar Surprise Attacks Get a Mathematical Treatment
From ACM TechNews

Cyberwar Surprise Attacks Get a Mathematical Treatment

Two University of Michigan professors have written a mathematical model that could help predict the timing of cyberattacks. 

The Malware That Duped Target Has Been Found
From ACM News

The Malware That Duped Target Has Been Found

The malicious program used to compromise Target and other companies was part of a widespread operation using a Trojan tool known as Trojan.POSRAM, according to...

It's the 30th Anniversary of the Supreme Court's Monumental Decision About Betamax
From ACM Opinion

It's the 30th Anniversary of the Supreme Court's Monumental Decision About Betamax

Those of us who came of age in the Internet era may not know that they owe their ability to go online to a court decision 30 years ago today about a mechanically...

Moth Drone Stays Rock Steady in Gale-Force Winds
From ACM News

Moth Drone Stays Rock Steady in Gale-Force Winds

They might not seem at all stable as they batter into light bulbs but moths have inspired an autopilot for drones.

New Fujitsu Labs Tech Can Do Batch Searches of Encrypted Data
From ACM TechNews

New Fujitsu Labs Tech Can Do Batch Searches of Encrypted Data

Fujitsu Laboratories has developed a fast method to perform secret searches of data that is encrypted. 

Quantum Physics Could Make Secure, Single-­se Computer Memories Possible
From ACM TechNews

Quantum Physics Could Make Secure, Single-­se Computer Memories Possible

Technology based on quantum physics could be used to make a memory device whose contents could only be read a single time. 

Out in the Open: An Nsa-Proof Twitter, Built With Code From Bitcoin and Bittorrent
From ACM TechNews

Out in the Open: An Nsa-Proof Twitter, Built With Code From Bitcoin and Bittorrent

Miguel Freitas is building a decentralized social network called Twister, which no single entity should be able to shut down. 

Is the $1,000 Genome For Real?
From ACM News

Is the $1,000 Genome For Real?


What Secrets Your Phone Is Sharing About You
From ACM News

What Secrets Your Phone Is Sharing About You

Fan Zhang, the owner of Happy Child, a trendy Asian restaurant in downtown Toronto, knows that 170 of his customers went clubbing in November.

N.s.a. Devises Radio Pathway Into Computers
From ACM News

N.s.a. Devises Radio Pathway Into Computers

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those...

The Best Time to Wage Cyberwar
From ACM News

The Best Time to Wage Cyberwar

If you discover a way to hack into your enemy's computers, do you strike while the iron is hot, or patiently wait for a better opportunity to arise?

Irs Under Pressure to Clarify Bitcoin Rules
From ACM News

Irs Under Pressure to Clarify Bitcoin Rules

The Internal Revenue Service is under mounting pressure to issue guidance clarifying how taxpayers should handle transactions involving bitcoin and other digital...

What the Heck Is a Ram Scraper?
From ACM News

What the Heck Is a Ram Scraper?

As the mystery around the credit card hacking at retail giants Target and Nieman Marcus continues to unfold, you’re going to start hearing a lot about something...

Ua-Developed Avatar Is Helping to Screen New Arrivals at Bucharest Airport
From ACM TechNews

Ua-Developed Avatar Is Helping to Screen New Arrivals at Bucharest Airport

Researchers have developed a virtual border agent to identify and question suspicious international travelers. 

Confused About the Nsa's Quantum Computing Project? This MIT Computer Scientist Can Explain.
From ACM Opinion

Confused About the Nsa's Quantum Computing Project? This MIT Computer Scientist Can Explain.

My Washington Post colleagues have reported on a National Security Agency program to to build a quantum computer.

The Next Data Privacy Battle May Be Waged Inside Your Car
From ACM News

The Next Data Privacy Battle May Be Waged Inside Your Car

Cars are becoming smarter than ever, with global positioning systems, Internet connections, data recorders and high-definition cameras.

Using Psychology to Create a Better Malware Warning
From ACM TechNews

Using Psychology to Create a Better Malware Warning

A new report on the psychology of malware warnings suggests that using different language could make the messages more effective. 

The Bitcoin-Mining Arms Race Heats Up
From ACM News

The Bitcoin-Mining Arms Race Heats Up

Joel Flickinger's two-bedroom home in the hills above Oakland, Calif., hums with custom-built computing gear.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account