acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Touch Screen Ids ­sers via Fingerprints
From ACM News

Touch Screen Ids ­sers via Fingerprints

Tabletop computers have not exactly taken the world by storm, as some predicted they would.

Nsa Surveillance Program Extended By Court, Intelligence Officials Say
From ACM News

Nsa Surveillance Program Extended By Court, Intelligence Officials Say

A secret court on Friday extended the National Security Agency's authority to collect and store the phone records of tens of millions of American cellphone customers...

Symantec: Google Glass Still Vulnerable to Wi-Fi Attack
From ACM TechNews

Symantec: Google Glass Still Vulnerable to Wi-Fi Attack

Just days after Google said it had patched a QR code vulnerability affecting its Google Glass wearable computer, Symantec says it has found another vulnerability...

Nsa Revelations Reframe Digital Life For Some
From ACM News

Nsa Revelations Reframe Digital Life For Some

In Louisiana, the wife of a former soldier is scaling back on Facebook posts and considering unfriending old acquaintances, worried an innocuous joke or long-lost...

A Black Box For Car Crashes
From ACM News

A Black Box For Car Crashes

When Timothy P. Murray crashed his government-issued Ford Crown Victoria in 2011, he was fortunate, as car accidents go.

Taiwan a 'Testing Ground' for Chinese Cyber Army
From ACM News

Taiwan a 'Testing Ground' for Chinese Cyber Army

Taiwan is the frontline in an emerging global battle for cyberspace, according to elite hackers in the island's IT industry, who say it has become a rehearsal area...

Eye-Tracking Could Outshine Passwords If Made User-Friendly
From ACM TechNews

Eye-Tracking Could Outshine Passwords If Made User-Friendly

A new biometric authentication technique identifies users based on their eye movements. 

The Creepy, Long-Standing Practice of Undersea Cable Tapping
From ACM News

The Creepy, Long-Standing Practice of Undersea Cable Tapping

In the early 1970s, the U.S. government learned that an undersea cable ran parallel to the Kuril Islands off the eastern coast of Russia, providing a vital communications...

Id Got You, Under the Skin: Automated Thermal Face Recognition Based on Minutiae Extraction
From ACM TechNews

Id Got You, Under the Skin: Automated Thermal Face Recognition Based on Minutiae Extraction

A thermal-imaging scan for instantaneous face recognition could be the next advance in biometrics. 

How the ­.s. Forces Net Firms to Cooperate on Surveillance
From ACM News

How the ­.s. Forces Net Firms to Cooperate on Surveillance

By wielding a potent legal threat, the U.S. government is often able to force Internet companies to aid its surveillance demands.

Make Way for State and Local Cyber-Ranges
From ACM TechNews

Make Way for State and Local Cyber-Ranges

The U.S. government has wanted a nationwide network of unclassified cyberexercise facilities for years, and now that idea is coming to state and local governments...

Alert! Study Finds Internet Users Heed Browser Warnings
From ACM TechNews

Alert! Study Finds Internet Users Heed Browser Warnings

Security warnings displayed by Web browsers are much more effective at deterring risky Internet behavior than was previously believed, a recent study found.

Attention, Shoppers: Store Is Tracking Your Cell
From ACM News

Attention, Shoppers: Store Is Tracking Your Cell

Like dozens of other brick-and-mortar retailers,Nordstrom wanted to learn more about its customers—how many came through the doors, how many were repeat visitors—the...

Fact or Fiction: Encryption Prevents Digital Eavesdropping
From ACM News

Fact or Fiction: Encryption Prevents Digital Eavesdropping

Since the dawn of the Web and ubiquitous free e-mail services over the past two decades, the need to secure personal information online has been evident but often...

Researchers Find Bug Bounty Programs Pay Economic Rewards
From ACM News

Researchers Find Bug Bounty Programs Pay Economic Rewards

Bug bounty programs can be as much as 100 times more cost-effective for finding security vulnerabilities than hiring full-time security researchers to do the same...

Your Facebook Friends May Be Evil Bots
From ACM TechNews

Your Facebook Friends May Be Evil Bots

Groups of social bots could lead to disaster for large online destinations, or even threaten the fabric of the Internet, the economy, and society as a whole. 

Feds Asked to Sit Out Defcon Hacking Conference This Year
From ACM TechNews

Feds Asked to Sit Out Defcon Hacking Conference This Year

Defcon hacking convention organizers have asked federal government workers not to attend the event this year. 

This Accused Hacker Is a Jerk. Here’s Why He Shouldn’t Be a Felon.
From ACM TechNews

This Accused Hacker Is a Jerk. Here’s Why He Shouldn’t Be a Felon.

Dozens of computer security experts have filed a brief in support of Andrew Auernheimer's attempt to overturn his conviction on computer-hacking charges. 

Kremlin Returns to Typewriters to Avoid Computer Leaks
From ACM News

Kremlin Returns to Typewriters to Avoid Computer Leaks

A source at Russia's Federal Guard Service, which is in charge of safeguarding Kremlin communications and protecting President Vladimir Putin, claimed that the...

Iran Planning Cyber Drills
From ACM News

Iran Planning Cyber Drills

Head of Iran's Civil Defense Organization Brigadier General Gholam Reza Jalali announced on Saturday that Iran plans to stage cyber exercises in the near future...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account