acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Google Declares War on the Password
From ACM TechNews

Google Declares War on the Password

Google's Eric Grosse and Mayank Upadhyay have published a research paper that explores hardware-based alternatives to the traditional password. 

Google Report Reveals Continued Rise in ­.S. Government Requests for Data
From ACM News

Google Report Reveals Continued Rise in ­.S. Government Requests for Data

Google has revealed the full scale of the U.S. government's use of controversial legislation that bypasses judicial approval to access the online information of...

Military Moves Closer to Truly Autonomous Drones
From ACM News

Military Moves Closer to Truly Autonomous Drones

Imagine a flying machine equipped with bombs and missiles, navigating the skies stealthily without human control.

Dod Looking to 'jump the Gap' Into Adversaries' Closed Networks
From ACM News

Dod Looking to 'jump the Gap' Into Adversaries' Closed Networks

Iran's uranium enrichment facility at Natanz may have had one of the most secure computer systems in the world.

Kinect Sensor Poised to Leap Into Everyday Life
From ACM News

Kinect Sensor Poised to Leap Into Everyday Life

When Microsoft's Kinect gaming sensor first exploded onto the gaming scene in 2010, it wasn't long before people started getting excited about what it might make...

The Fbi Needs Hackers, Not Backdoors
From ACM Opinion

The Fbi Needs Hackers, Not Backdoors

Just imagine if all the applications and services you saw or heard about at CES earlier this month had to be designed to be "wiretap ready" before they could be...

Conquering Babel
From ACM News

Conquering Babel

In "Star Trek", a television series of the 1960s, no matter how far across the universe the Starship Enterprise traveled, any aliens it encountered would converse...

Iran Strengthened Cyber Capabilities After Stuxnet: U.s. General
From ACM News

Iran Strengthened Cyber Capabilities After Stuxnet: U.s. General

Iran responded to a 2010 cyber attack on its nuclear facilities by beefing up its own cyber capabilities, and will be a "force to be reckoned with" in the future...

Can You Predict the Future By Reading Twitter? The Pentagon Thinks Maybe
From ACM News

Can You Predict the Future By Reading Twitter? The Pentagon Thinks Maybe

The Defense Department wants new computer tools to analyze mounds of unstructured text, blogs, and tweets as part of a coordinated push to help military analysts...

­.s. Cities Relying on Precog Software to Predict Murder
From ACM News

­.s. Cities Relying on Precog Software to Predict Murder

Who needs the freaky precogs of Minority Report to predict if someone’s likely to commit murder when you have an algorithm that can do it for you?

Banks Seek Nsa Help Amid Attacks on Their Computer Systems
From ACM News

Banks Seek Nsa Help Amid Attacks on Their Computer Systems

Major U.S. banks have turned to the National Security Agency for help protecting their computer systems after a barrage of assaults that have disrupted their Web...

How the Government's 2013 Tech Policy Agenda Will Impact IT
From ACM TechNews

How the Government's 2013 Tech Policy Agenda Will Impact IT

Cybersecurity is the most urgent of the critical technology issues that lawmakers and regulators will grapple with in 2013. The White House is expected to ask...

Robocallers Stand Out in a Troll Through Chinese Cellphone Records
From ACM News

Robocallers Stand Out in a Troll Through Chinese Cellphone Records

The availability of electronic records of communications, from the use of cellphones to chats in online games, has given social scientists new options for studying...

Cyberwar's Gray Market
From ACM News

Cyberwar's Gray Market

Behind computer screens from France to Fort Worth, Texas, elite hackers hunt for security vulnerabilities worth thousands of dollars on a secretive unregulated...

From ACM News

Malicious Virus Shuttered Power Plant: Dhs

A computer virus attacked a turbine control system at a power company when a technician unknowingly inserted an infected USB computer drive into the network, keeping...

Researchers Find Blocking Internet Pirating Sites Is Not Effective
From ACM TechNews

Researchers Find Blocking Internet Pirating Sites Is Not Effective

Researchers recently conducted a study on the effectiveness of anti-piracy measures taken by content providers. The research indicates that strategies such as...

Facebook on Collision Course With Google on Web Searches
From ACM News

Facebook on Collision Course With Google on Web Searches

After years of collecting photos and personal data from its billion-plus members, Facebook Inc. Tuesday unveiled a search tool that sifts through people's profiles—and...

Iranian Military Able to Repel Enemy Jamming, Electronic Attacks
From ACM News

Iranian Military Able to Repel Enemy Jamming, Electronic Attacks

A senior Iranian army commander lauded the achievements of the country's Armed Forces in electronic warfare, stressing that Iran's military units can maintain communications...

Cyber Security in 2013: How Vulnerable to Attack Is U.s. Now?
From ACM TechNews

Cyber Security in 2013: How Vulnerable to Attack Is U.s. Now?

Last year offered many unsettling revelations for businesses, individuals, and U.S. government officials concerned about cyberattacks. There is more befuddlement...

Rocra Espionage Malware Campaign ­ncovered After Five Years of Activity
From ACM News

Rocra Espionage Malware Campaign ­ncovered After Five Years of Activity

For five years, it hid in the weeds of networks used by Eastern European diplomats, government employees and scientific research organizations, stealing data and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account