acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Nsa Sponsors 'cyber Operations' Training at ­niversities. Here's What Students Learn.
From ACM News

The Nsa Sponsors 'cyber Operations' Training at ­niversities. Here's What Students Learn.

Last week, Carnegie Mellon University in Pittsburgh became one of the latest—and most prestigious—schools to partner with the National Security Agency on a program...

Mapping the Bitcoin Economy Could Reveal Users' Identities
From ACM TechNews

Mapping the Bitcoin Economy Could Reveal Users' Identities

An analysis of the public log of Bitcoin digital currency transactions could enable law enforcement to pinpoint user identities. 

Imagining a Cyberattack on the Power Grid
From ACM Opinion

Imagining a Cyberattack on the Power Grid

It's electrifying.

iSpy: How the NSA Accesses Smartphone Data
From ACM News

iSpy: How the NSA Accesses Smartphone Data

Michael Hayden has an interesting story to tell about the iPhone.

Beyond Passwords: New Tools to Identify Humans
From ACM News

Beyond Passwords: New Tools to Identify Humans

As everything around us becomes connected to the Internet, from cars to thermometers to the stuff inside our mobile phones, technologists are confronting a tough...

Nsa Surveillance Makes For Strange Bedfellows
From ACM Opinion

Nsa Surveillance Makes For Strange Bedfellows

The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...

How the N.S.A Cracked the Web
From ACM News

How the N.S.A Cracked the Web

It's been nearly three months since Edward Snowden started telling the world about the National Security Agency's mass surveillance of global communications.

Huge Botnet Found ­sing Tor Network For Communications
From ACM News

Huge Botnet Found ­sing Tor Network For Communications

In the wake of the revelations surrounding the NSA's domestic surveillance and intelligence-gathering operations, security experts said there would likely be a...

Nsa Able to Foil Basic Safeguards of Privacy on Web
From ACM TechNews

Nsa Able to Foil Basic Safeguards of Privacy on Web

The National Security Agency uses a variety of means to overcome encryption technologies, such as supercomputers, technical strategies, court orders, and persuasion...

Tech Pioneer Vint Cerf on the Age of Context and Why You Can't Be a Citizen of the Internet
From ACM Opinion

Tech Pioneer Vint Cerf on the Age of Context and Why You Can't Be a Citizen of the Internet

Few people have as much claim as Vint Cerf to the title "Father of the Internet," but as the technologies he helped develop in the 1970s and 1980s become increasingly...

Your Phone Is Blabbing Your Location to Anyone Who Will Listen
From ACM News

Your Phone Is Blabbing Your Location to Anyone Who Will Listen

Everywhere you go, your phone is sending out signals that can be assembled to form a picture of your movements.

Drug Agents ­se Vast Phone Trove, Eclipsing N.s.a.'s
From ACM News

Drug Agents ­se Vast Phone Trove, Eclipsing N.s.a.'s

For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that...

How 'cell Tower Dumps' Caught the High Country Bandit—and Why It Matters
From ACM News

How 'cell Tower Dumps' Caught the High Country Bandit—and Why It Matters

On February 18, 2010, the FBI field office in Denver issued a "wanted" notice for two men known as "the High Country Bandits"—a rather grandiose name for a pair...

­.s. Appetite For Internet ­ser Data Not ­nique
From ACM TechNews

­.s. Appetite For Internet ­ser Data Not ­nique

Despite recent concerns about information collection by the United States, law enforcement agencies in Europe and other nations appear to gather equal or greater...

Vending Machines Get Smart to Accommodate the Cashless
From ACM Careers

Vending Machines Get Smart to Accommodate the Cashless

More than 40 percent of U.S. adults say they can go a week without paying for something with cash, according to a survey conducted by Rasmussen Reports last year...

Inside the Response to the New York Times Attack
From ACM News

Inside the Response to the New York Times Attack

Late Tuesday morning, one of the engineers in CloudFlare's San Francisco office saw a message on Twitter saying that the New York Times Web site was down. Minutes...

How Syrian Hackers Found the New York Times's Australian Weak Spot
From ACM News

How Syrian Hackers Found the New York Times's Australian Weak Spot

A hacking attack launched by the Syrian Electronic Army may have targeted the New York Timesand other U.S. media companies, but the weak link was Melbourne IT (...

Here's How One Hacker Is Waging War on the Syrian Government
From ACM Careers

Here's How One Hacker Is Waging War on the Syrian Government

As President Obama weighed U.S. air strikes in Syria this week, a lone American hacker was waging his own attack on the Syrian government.

How Scholars Hack the World of Academic Publishing Now
From ACM News

How Scholars Hack the World of Academic Publishing Now

If you want to understand the modern academy, it wouldn't hurt to start at "impact factor."

The New York Times Web Site Was Taken Down By Dns Hijacking. Here's What That Means.
From ACM News

The New York Times Web Site Was Taken Down By Dns Hijacking. Here's What That Means.

Just weeks after The Washington Post had our own run-in with the Syrian Electronic Army (SEA), the New York Times is down, and the SEA is claiming responsibility...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account