acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How to Share Scientific Data
From ACM News

How to Share Scientific Data

Stewart Brand, the founder of the Whole Earth catalog and a Silicon Valley muse, once said that information wanted to be free and expensive, simultaneously. That...

'spoofers' Use Fake Gps Signals to Knock a Yacht Off Course
From ACM News

'spoofers' Use Fake Gps Signals to Knock a Yacht Off Course

University of Texas researchers recently tricked the navigation system of an $80 million yacht and sent the ship off course in an experiment that showed how any...

More Connected Homes, More Problems
From ACM News

More Connected Homes, More Problems

As a growing number of Internet-connected home appliances hit the market, David Bryan and Daniel Crowley worry that digital ne'er-do-wells will get new ways to...

As New Targets For Hackers, Your Car and Your House
From ACM News

As New Targets For Hackers, Your Car and Your House

Imagine driving on the freeway at 60 miles per hour and your car suddenly screeches to a halt, causing a pileup that injures dozens of people.

Hardware Trick Could Keep Cloud Data Safe
From ACM TechNews

Hardware Trick Could Keep Cloud Data Safe

The new Ascend chip could protect data in the cloud by concealing the way in which central processing units request information in cloud servers. 

How Wearable Technology Could Transform Business
From ACM Opinion

How Wearable Technology Could Transform Business

Once upon a time seeing your life flash before your eyes was something people did their best to avoid. The arrival of Google Glass seems to have changed that.

Electric Therapy For Medical-Device Malware
From ACM TechNews

Electric Therapy For Medical-Device Malware

A new system designed to catch malware on medical devices by noting subtle changes in their power consumption is designated WattsUpDoc. 

Dhs Adds Foraging to Tech Arsenal
From ACM TechNews

Dhs Adds Foraging to Tech Arsenal

The U.S. Department of Homeland Security can turn to technology foraging when it does not have a specific technology needed to solve a problem. 

Nsa Claims It 'touches' Only 1.6 Percent of Internet Traffic
From ACM News

Nsa Claims It 'touches' Only 1.6 Percent of Internet Traffic

Just hours after President Obama defended the National Security Agency's activities, the foreign surveillance agency released a document in which it claims to review...

The Science Behind the Netflix Algorithms That Decide What You'll Watch Next
From ACM News

The Science Behind the Netflix Algorithms That Decide What You'll Watch Next

If you liked 1960s Star Trek, the first non-Trek title that Netflix is likely to suggest to you is the original Mission: Impossible series (the one with the cool...

Nsa to Cut System Administrators By 90 Percent to Limit Data Access
From ACM News

Nsa to Cut System Administrators By 90 Percent to Limit Data Access

The U.S. National Security Agency, hit by disclosures of classified data by former contractor Edward Snowden, said Thursday it intends to eliminate about 90 percent...

Silent Circle Follows Lavabit in Shuttering Encrypted Email
From ACM News

Silent Circle Follows Lavabit in Shuttering Encrypted Email

Silent Circle shuttered its encrypted email service on Thursday, the second such closure in just a few hours in an apparent attempt to avoid government scrutiny...

From ACM News

N.s.a. Said to Search Content of Messages to and From U.s.

The National Security Agency is searching the contents of vast amounts of Americans' email and text communications into and out of the country, hunting for people...

Former Nsa Chief on Latest Leaked Dragnet Spy Program: It's Real, and It's Spectacular
From ACM Opinion

Former Nsa Chief on Latest Leaked Dragnet Spy Program: It's Real, and It's Spectacular

Does the NSA really operate a vast database that allows its analysts to sift through millions of records showing nearly everything a user does on the Internet,...

The Five Scariest Hacks We Saw Last Week
From ACM News

The Five Scariest Hacks We Saw Last Week

If something can connect to a network, it can be hacked. Computers and phones are still popular targets, but increasingly so are cars, home security systems, TVs...

Users of Hidden Net Advised to Ditch Windows
From ACM News

Users of Hidden Net Advised to Ditch Windows

Legitimate users of the Tor anonymous browsing service are being advised to stop using Windows if they want to keep their identity hidden.

Nsa Revelations Could Hurt Collaboration with 'betrayed' Hackers
From ACM Careers

Nsa Revelations Could Hurt Collaboration with 'betrayed' Hackers

The U.S. government's efforts to recruit talented hackers could suffer from the recent revelations about its vast domestic surveillance programs, as many private...

Crypto Experts Issue a Call to Arms to Avert the Cryptopocalypse
From ACM News

Crypto Experts Issue a Call to Arms to Avert the Cryptopocalypse

At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved...

Fbi Taps Hacker Tactics to Spy on Suspects
From ACM News

Fbi Taps Hacker Tactics to Spy on Suspects

Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal...

Networked Cars Are Coming, but Their Hacks Are Already Here
From ACM TechNews

Networked Cars Are Coming, but Their Hacks Are Already Here

Concurrent with a new push for connected-vehicle technology to facilitate collision avoidance is an emphasis on its potential security vulnerabilities. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account