acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


New Tracking Frontier: Your License Plates
From ACM News

New Tracking Frontier: Your License Plates

For more than two years, the police in San Leandro, Calif., photographed Mike Katz-Lacabe's Toyota Tercel almost weekly.

DDoS Attacks on Major U.S. Banks Are No Stuxnet—Here's Why
From ACM News

DDoS Attacks on Major U.S. Banks Are No Stuxnet—Here's Why

The attacks that recently disrupted website operations at Bank of America and at least five other major U.S. banks used compromised Web servers to flood their targets...

The Real Tron: It Security as a Shoot 'em Up
From ACM TechNews

The Real Tron: It Security as a Shoot 'em Up

MIT researchers have developed an approach that allows IT security professionals to patrol their assigned environments as if they were playing a first-person shooter...

The Real Tron: It Security As a Shoot 'em ­p
From ACM News

The Real Tron: It Security As a Shoot 'em ­p

Alert to a sudden threat, you race down a virtual corridor of servers, hot on the tail of malicious software.

Sites That Pay the Shopper For Being a Seller
From ACM Careers

Sites That Pay the Shopper For Being a Seller

Julie Medeiros thinks her taste in fashion is worth something. Turns out it is: about $50 a month.

Researchers Demonstrate 3d Spy Trojan For Mobile Phones
From ACM TechNews

Researchers Demonstrate 3d Spy Trojan For Mobile Phones

Researchers at Indiana University Bloomington and the Naval Surface Warfare Center have developed PlaceRaider, a program that uses a phone's camera to take pictures...

Megadroid: 300,000 Androids Clustered Together to Study Network Havoc
From ACM News

Megadroid: 300,000 Androids Clustered Together to Study Network Havoc

Anyone who builds an Android app knows that testing on real devices is important. But what if instead of testing on one device at a time, you could test 300,000...

New Android Malware App Turns Phone Into Surveillance Device
From ACM News

New Android Malware App Turns Phone Into Surveillance Device

Mobile malware has largely been limited to Trojans buried inside a malicious app targeting sensitive data stored on the phone such as email, contact information...

U.s. Bank Website Hackers Used Advanced Botnets, Diverse Tools
From ACM News

U.s. Bank Website Hackers Used Advanced Botnets, Diverse Tools

The hackers behind the cyber attacks on major U.S. banks have repeatedly disrupted online banking by using sophisticated and diverse tools that point to a carefully...

Cyber Attackers Disrupt Internet in Iran: Official
From ACM News

Cyber Attackers Disrupt Internet in Iran: Official

Cyber attackers have targeted Iranian infrastructure and communications companies, disrupting the Internet across the country, a state official was quoted as saying...

Commander: Iranian Cyber Forces Easily Access Enemies' Highly Classified Info
From ACM News

Commander: Iranian Cyber Forces Easily Access Enemies' Highly Classified Info

Commander of the Islamic Revolution Guard Corps Navy Rear Admiral Ali Fadavi stressed the high capability of the country's cyberwar experts, and said the Iranian...

U.s. Law Enforcement Is Tracking Who Calls, Texts, and Emails Whom More Often Than Ever Before
From ACM News

U.s. Law Enforcement Is Tracking Who Calls, Texts, and Emails Whom More Often Than Ever Before

Law enforcement isn't just interested in what Americans are saying on the phone or on the Internet.

Mobile Ads: Here's What Works and What Doesn't
From ACM News

Mobile Ads: Here's What Works and What Doesn't

In 2010, Apple Inc. AAPL co-founder Steve Jobs proclaimed, "Mobile advertising really sucks." Now, however, the rule book for what works in mobile advertising is...

Facebook's New Pitch to Brand Advertisers: Forget About Clicks
From ACM News

Facebook's New Pitch to Brand Advertisers: Forget About Clicks

Facebook Inc., stung by doubts that advertising on the social network delivers enough bang for the buck, is preparing to unveil data to counter its critics and...

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems
From ACM News

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems

The emails arrived like poison darts from cyberspace.

­c Berkeley Researchers May Track Twitter Hackers
From ACM TechNews

­c Berkeley Researchers May Track Twitter Hackers

A $10 million grant from the U.S. National Science Foundation will enable University of California, Berkeley researchers to spend the next five years exploring...

Why Your Next 'passw0rd' Might Not Be a Password
From ACM News

Why Your Next 'passw0rd' Might Not Be a Password

It's been a rough year for passwords. First, 6.5 million LinkedIn passwords were leaked online. Soon after, millions of passwords from eHarmony and Yahoo users...

Nist's Hash Algorithm Refresh Possibly Premature
From ACM TechNews

Nist's Hash Algorithm Refresh Possibly Premature

The U.S. National Institute of Standards and Technology soon will announce the winning hash algorithm, which eventually will become the next-generation industry...

From ACM News

­m Researchers Mine Data to ­ncover Terrorist Threats

U.S. counterterrorism efforts monitor and sort vast databases of information for clues on potential plots. Now a team of University of Maryland researchers have...

Why Everyone (not Just Geeks) Should Care About Big Data
From ACM Opinion

Why Everyone (not Just Geeks) Should Care About Big Data

Hugo Campos has a cardiac defibrillator implanted in his body. It sends data about his heart to his doctors and back to the manufacturer, but it takes days to get...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account