acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Israel Launches Cyber Warfare Training Program
From ACM TechNews

Israel Launches Cyber Warfare Training Program

Israel is recruiting top students for a new cyberwarfare training program. The program shows how Israel is advancing in the field of cybernetics to develop "high...

Outmaneuvered at Their Own Game, Antivirus Makers Struggle to Adapt
From ACM News

Outmaneuvered at Their Own Game, Antivirus Makers Struggle to Adapt

The antivirus industry has a dirty little secret: its products are often not very good at stopping viruses.

Ftc Offers $50,000 Reward to Help Stop Robocalls
From ACM Careers

Ftc Offers $50,000 Reward to Help Stop Robocalls

Unwanted telemarketing calls, trademarked for interrupting dinners across the nation, have become such a nuisance over the years that the Federal Trade Commission...

Privacy by the Numbers: A New Approach to Safeguarding Data
From ACM News

Privacy by the Numbers: A New Approach to Safeguarding Data

In 1997, when Massachusetts began making health records of state employees available to medical researchers, the government removed patients' names, addresses,...

Can China Prevent Web Pseudonyms? Probably Not
From ACM News

Can China Prevent Web Pseudonyms? Probably Not

Chinese Internet cops are at it again.

China Tightens Internet Controls, Legalizes Post Deletion
From ACM News

China Tightens Internet Controls, Legalizes Post Deletion

China unveiled tighter Internet controls on Friday, legalizing the deletion of posts or pages which are deemed to contain "illegal" information and requiring service...

Revealed: Nsa Targeting Domestic Computer Systems in Secret Test
From ACM TechNews

Revealed: Nsa Targeting Domestic Computer Systems in Secret Test

The U.S. National Security Agency has launched Perfect Citizen, a program to find security vulnerabilities in the computerized systems that control utilities....

Iran Repels New ­.s. Cyber Attack
From ACM News

Iran Repels New ­.s. Cyber Attack

Iran announced that it has thwarted a second cyber attack on one of its Culture Ministry institutes.

Forget Yolo: Why 'big Data' Should Be the Word of the Year
From ACM Opinion

Forget Yolo: Why 'big Data' Should Be the Word of the Year

"Big Data" hasn't made any of the words-of-the-year lists I've seen so far. That's probably because it didn't get the wide public exposure given to items like "...

Who Owns the Content You ­pload Online?
From ACM Opinion

Who Owns the Content You ­pload Online?

The outrage over Instagram's announcement that it is changing its terms and conditions has turned the spotlight on the relationship between websites and users who...

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive
From ACM News

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive

Some of the most important clues about what drove Adam Lanza to mass murder probably sit on the computer that the reclusive, technical-minded 20-year-old used as...

Warning, Speedsters: You Can't Fool Quantum Radar
From ACM News

Warning, Speedsters: You Can't Fool Quantum Radar

Is it a bird, a plane, or a speeding car?

Beyond Hadoop
From Communications of the ACM

Beyond Hadoop

The leading open source system for processing big data continues to evolve, but new approaches with added features are on the rise.

Stopping the Leaks
From Communications of the ACM

Stopping the Leaks

Side channels give out information that can be used to crack secrets, but researchers are identifying the holes and trying to close them.

North Korea: On the Net in World's Most Secretive Nation
From ACM News

North Korea: On the Net in World's Most Secretive Nation

There's a curious quirk on every official North Korean Website: a piece of programming that must be included in each page's code.

Verizon to Test Support For One Password For Whole Internet
From ACM TechNews

Verizon to Test Support For One Password For Whole Internet

Online identity and technology companies are collaborating to test whether consumers would trust a single, highly secure user-password combination for all of their...

New Standard/tool Address Security Dependencies
From ACM TechNews

New Standard/tool Address Security Dependencies

The standards organization Open Group has created a standard for modeling security dependencies. The "Dependency Modeling Standard" will enable the military and...

Selling Flak Jackets in the Cyberwars
From ACM News

Selling Flak Jackets in the Cyberwars

When the Israeli army and Hamas trade virtual blows in cyberspace, or when hacker groups like Anonymous rise from the digital ether, or when WikiLeaks dumps a trove...

Hacking the Human Brain: The Next Domain of Warfare
From ACM News

Hacking the Human Brain: The Next Domain of Warfare

It's been fashionable in military circles to talk about cyberspace as a "fifth domain" for warfare, along with land, space, air, and sea.

A Brooklyn Protester Pleads Guilty After His Twitter Posts Sink His Case
From ACM News

A Brooklyn Protester Pleads Guilty After His Twitter Posts Sink His Case

In the end, the tweets told the tale.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account