acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Digital Wallet Is Starting to Take Shape
From ACM News

The Digital Wallet Is Starting to Take Shape

Imagine if, in addition to all the things your smartphone does now, it could also act as your keys to the real world.

The Security Skills Shortage Is Worse Than You Think
From ACM TechNews

The Security Skills Shortage Is Worse Than You Think

Enterprise employers and security specialists are increasingly growing concerned about what some see as a deepening skills shortage in the information technology...

Helping Utilities Monitor For Network Security
From ACM TechNews

Helping Utilities Monitor For Network Security

Idaho National Laboratory researchers have developed Sophia, software designed to help network operators detect intruders and other anomalies.

A Who's Who of Mideast-Targeted Malware
From ACM News

A Who's Who of Mideast-Targeted Malware

What do Stuxnet, Duqu, Gauss, Mahdi, Flame, Wiper, and Shamoon have in common?

Researchers Hack Brainwaves to Reveal Pin Numbers, Other Personal Data
From ACM News

Researchers Hack Brainwaves to Reveal Pin Numbers, Other Personal Data

Don't you dare even think about your banking account password when you slap on those fancy new brainwave headsets.

This Touch Screen Knows Your Touch
From ACM TechNews

This Touch Screen Knows Your Touch

Rutgers University researchers have developed a device that could identify an individual user and rapidly switch a system's settings to adjust to the user, providing...

Software Meant to Fight Crime Is ­sed to Spy on Dissidents
From ACM TechNews

Software Meant to Fight Crime Is ­sed to Spy on Dissidents

Commercially available spyware originally designed to aid in criminal investigations is being used by repressive regimes to track political dissidents, according...

From Bug Drones to Disease Assassins, Super Weapons Rule ­.s. War Game
From ACM News

From Bug Drones to Disease Assassins, Super Weapons Rule ­.s. War Game

A rogue state is on the verge of developing a deadly biological weapon against which the rest of the world has no defense.

Analysis Shows Traces of Wiper Malware But No Links to Flame
From ACM News

Analysis Shows Traces of Wiper Malware But No Links to Flame

One of the things about the investigation into the Flame malware that's remained unclear for several months now is what ever became of the so-called Wiper virus...

'frankenstein' Programmers Test a Cybersecurity Monster
From ACM TechNews

'frankenstein' Programmers Test a Cybersecurity Monster

University of Texas (UT) at Dallas researchers have developed Frankenstein, a software system that can cloak itself as it steals and reconfigures information in...

Gps Technology Finding Its Way Into Court
From ACM News

Gps Technology Finding Its Way Into Court

The rapid spread of cellphones with GPS technology has allowed police to track suspects with unprecedented precision—even as they commit crimes. But the legal fight...

Massive Cyberattack: Act 1 of Israeli Strike on Iran?
From ACM News

Massive Cyberattack: Act 1 of Israeli Strike on Iran?

Talk in Israel of a military strike on Iranian nuclear facilities has reached a fever pitch.

The Rise of Cross-Platform Malware
From ACM News

The Rise of Cross-Platform Malware

For most of the recorded history of malware, viruses, Trojans, and other malicious software have been specialists.

Researchers Create 'frankenstein' Malware Made Up of Common Gadgets
From ACM TechNews

Researchers Create 'frankenstein' Malware Made Up of Common Gadgets

University of Texas researchers Vishwath Mohan and Kevin Hamlen have created a computer virus from common gadgets that can evade conventional antivirus programs...

Siemens 'flaw' Claim Sparks U.s. Power Plant Security Probe
From ACM News

Siemens 'flaw' Claim Sparks U.s. Power Plant Security Probe

A security expert said that he had found a backdoor in hardware from a Siemens subsidiary, RuggedCom.

Security Experts Warn of Risky Attacks on Tech-Loaded Cars
From ACM TechNews

Security Experts Warn of Risky Attacks on Tech-Loaded Cars

Computer security experts are now focusing on cars as automakers increasingly include computers and electronic communication systems in their latest models.

Atomic-Level Computing
From Communications of the ACM

Atomic-Level Computing

Thanks to the University of New South Wales and IBM Research, scientists are moving closer to the junction of quantum and digital computing.

Chips Go Upscale
From Communications of the ACM

Chips Go Upscale

After decades in Flatland, the end of Moore's Law is pushing semiconductors into the third dimension.

Garbage In, Info Out
From Communications of the ACM

Garbage In, Info Out

Security researchers used malware to investigate large-scale Internet censorship in Egypt and Libya.

In Honor of Alan Turing
From Communications of the ACM

In Honor of Alan Turing

Thirty-two of the 39 living A.M. Turing Award laureates gathered in San Francisco to pay tribute to "the father of CS" and discuss the past, present, and future...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account