acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Revealed: The 1962 CIA Paper That Predicts the Big Deal With Big Data
From ACM News

Revealed: The 1962 CIA Paper That Predicts the Big Deal With Big Data

The Central Intelligence Agency has published for the first time "Some Far-Out Thoughts on Computers," a 1962 internal document that shows how eager the agency...

Hacking Highlights Dangers to Seoul of North's Cyber-Warriors
From ACM News

Hacking Highlights Dangers to Seoul of North's Cyber-Warriors

A hacking attack that brought down three South Korean broadcasters and two major banks has been identified by most commentators as North Korea flexing its muscles...

Cyberwar Manual Lays Down Rules For Online Attacks
From ACM News

Cyberwar Manual Lays Down Rules For Online Attacks

Even cyberwar has rules, and one group of experts is putting out a manual to prove it.

When 'likes' Can Shed Light
From ACM News

When 'likes' Can Shed Light

Patterns of "Likes" posted by people on Facebook can unintentionally expose their political and religious views, drug use, divorce, and sexual orientation, researchers...

Mind Plus Machine
From ACM News

Mind Plus Machine

Behind a locked door in a white-walled basement in a research building in Tempe, Ariz., a monkey sits stone-still in a chair, eyes locked on a computer screen.

U.s. Drones Fail to Identify Blind Spots of Iran's Radar Systems
From ACM News

U.s. Drones Fail to Identify Blind Spots of Iran's Radar Systems

A senior Iranian lawmaker lauded the country's Armed Forces for their vigilance and ability in discovering and repelling enemy aggressions, and said the US intended...

Cyberattack on Florida Election Is First Known Case in U.s., Experts Say
From ACM News

Cyberattack on Florida Election Is First Known Case in U.s., Experts Say

An attempt to illegally obtain absentee ballots in Florida last year is the first known case in the U.S. of a cyberattack against an online election system, according...

National Security Letters Are Unconstitutional, Federal Judge Rules
From ACM News

National Security Letters Are Unconstitutional, Federal Judge Rules

A federal district court judge in San Francisco has ruled that National Security Letter (NSL) provisions in federal law violate the Constitution. The decision came...

Israel Ramps ­p Its Cyberdefense Training
From ACM Careers

Israel Ramps ­p Its Cyberdefense Training

Twice a week about 200 Israeli high school students in seven separate locations meet after school for six hours of extra classes.

Google Wants to Replace Your Passwords With a Ring
From ACM TechNews

Google Wants to Replace Your Passwords With a Ring

Google has developed rings designed to be worn on the finger that provide security for logging into a computer or an online account.

Steganography Is No Laughing Matter
From ACM TechNews

Steganography Is No Laughing Matter

A computer scientist has developed an approach to steganography that uses jokes to make hidden messages less obvious. 

Researchers Find 25 Countries Using Surveillance Software
From ACM TechNews

Researchers Find 25 Countries Using Surveillance Software

As many as 25 governments, some with controversial human rights records, appear to engage in surveillance of citizens using off-the-shelf software.

Cryptographers Demonstrate New Crack For Common Web Encryption
From ACM News

Cryptographers Demonstrate New Crack For Common Web Encryption

It's long been known that one of the oldest and most widely used standards for encrypting Web sites has some serious weaknesses. But one group of researchers has...

U.s. Security Chief Warns of Rising Cyber Threats
From ACM TechNews

U.s. Security Chief Warns of Rising Cyber Threats

Cyberattacks represent the greatest threat to U.S. security, according to a new report by Director of National Intelligence James Clapper.

Peter G. Neumann: Top Cop on the Hair-Raising Cybersecurity Beat
From ACM Opinion

Peter G. Neumann: Top Cop on the Hair-Raising Cybersecurity Beat

The threat is always there—in your car, at the office, on the table next to where you sleep at night: a near-biblical plague of worms, phisher kings, identity thieves...

Pentagon Creating Teams to Launch Cyberattacks as Threat Grows
From ACM News

Pentagon Creating Teams to Launch Cyberattacks as Threat Grows

The Pentagon's Cyber Command will create 13 offensive teams by the fall of 2015 to help defend the nation against major computer attacks from abroad, Gen. Keith...

Google Concedes That Drive-By Prying Violated Privacy
From ACM News

Google Concedes That Drive-By Prying Violated Privacy

Google on Tuesday acknowledged to state officials that it had violated people's privacy during its Street View mapping project when it casually scooped up passwords...

Clues Suggest Malware Is Moving from Pcs to Mobile Devices
From ACM News

Clues Suggest Malware Is Moving from Pcs to Mobile Devices

The fact that smartphones and tablets don't need antivirus software or regular software updates is a major reason for their popularity.

Students Develop Secure New Procedure For Online Banking
From ACM TechNews

Students Develop Secure New Procedure For Online Banking

Researchers working with a financial IT solutions firm have developed a process that makes online banking more secure. 

Kim Dotcom Is the Anti-Zuckerberg: Share Nothing, Encrypt Everything, Be Happy
From ACM Opinion

Kim Dotcom Is the Anti-Zuckerberg: Share Nothing, Encrypt Everything, Be Happy

Appearing like a retro-futuristic apparition, digitally transmitted through pneumatic tubes from a future that was but will never be, the disembodied head of Kim...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account