acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Why Apple Will Turn to Holograms
From ACM News

Why Apple Will Turn to Holograms

Look around your office hallway or college campus and you'll see people holding interactive panes of glass.

From ACM News

Average Web App Attacked Every Three Days

Do not envy the life of a Web app. It's a brutal, public existence filled with attacks from all sides. In fact, a new report by Imperva sheds some light on this...

Appeals Court Oks Warrantless Wiretapping
From ACM News

Appeals Court Oks Warrantless Wiretapping

The federal government may spy on Americans' communications without warrants and without fear of being sued, a federal appeals court ruled Tuesday in a decision...

Disinformation Flies in Syria's Growing Cyber War
From ACM News

Disinformation Flies in Syria's Growing Cyber War

On Sunday, it was a hijacked Reuters Twitter feed trying to create the impression of a rebel collapse in Aleppo. On Monday, it was another account purporting to...

Tired of Security Problems? Change Rules of Writing Code
From ACM TechNews

Tired of Security Problems? Change Rules of Writing Code

Security researcher Dan Kaminsky believes rethinking the basic rules of computer science can dramatically improve computer security, and argues that "there's not...

How Apple and Amazon Security Flaws Led to My Epic Hacking
From ACM Opinion

How Apple and Amazon Security Flaws Led to My Epic Hacking

In the space of one hour, my entire digital life was destroyed.

Why Drone Pilots Deserve Medals
From ACM Opinion

Why Drone Pilots Deserve Medals

The escalating dependence on drone pilots, as Maj. Dave Blair agonized in the May-June issue ofAir & Space Power Journal, is undercutting the ability to award combat...

Does Cybercrime Really Cost $1 Trillion?
From ACM News

Does Cybercrime Really Cost $1 Trillion?

Gen. Keith Alexander is the director of the National Security Agency and oversees U.S. Cyber Command, which means he leads the government's effort to protect America...

From ACM News

Hey, Hackers: Defense Is Sexy, Too

Pleasing the crowd at the Black Hat and Def Con computer security conferences that took place in Las Vegas last week is relatively easy: simply hop on stage and...

How Fbi Technology Woes Let Fort Hood Shooter Slip By
From ACM News

How Fbi Technology Woes Let Fort Hood Shooter Slip By

On November 5, 2009, an Army psychiatrist stationed at Fort Hood, Texas shot and killed 12 fellow soldiers and a civilian Defense Department employee while wounding...

A Computer Infection That Can Never Be Cured
From ACM TechNews

A Computer Infection That Can Never Be Cured

French hacker Jonathan Brossard recently developed Rakshasa, software that can be hidden inside the hardware of a PC, creating a backdoor that would allow secret...

U.s. Sports Fans Using Proxy Servers to Watch Olympics on Bbc
From ACM News

U.s. Sports Fans Using Proxy Servers to Watch Olympics on Bbc

The American network NBC has come in for a lot of flak since the weekend when its Olympics coverage began. The Twitter hadtag of #NBCfail began trending soon after...

Honeybot Project Helps Researchers Wipeout Facebook and Twitter Botnets
From ACM TechNews

Honeybot Project Helps Researchers Wipeout Facebook and Twitter Botnets

Researchers at the University of Illinois at Urbana-Champaign and University of Washington have developed Sodexo, an automated "honeybot" system that protects against...

Nsa Boss Wants More Control Over the 'net
From ACM News

Nsa Boss Wants More Control Over the 'net

The U.S. Internet's infrastructure needs to be redesigned to allow the NSA to know instantly when overseas hackers might be attacking public or private infrastructure...

The Frightening Things You Hear at a Black Hat Conference
From ACM Opinion

The Frightening Things You Hear at a Black Hat Conference

Here is a look at some of the highlights and scarier happenings taking place at the annual Black Hat hacker conference in Las Vegas last week.

Tagging and Tracking Espionage Botnets
From ACM Opinion

Tagging and Tracking Espionage Botnets

A security researcher who's spent 18 months cataloging and tracking malicious software that was developed and deployed specifically for spying on governments, activists...

Meet 'rakshasa,' The Malware Infection Designed To Be ­ndetectable And Incurable
From ACM News

Meet 'rakshasa,' The Malware Infection Designed To Be ­ndetectable And Incurable

Malicious software, like all software, gets smarter all the time. In recent years it’s learned to destroy physical infrastructure, install itself through Microsoft...

From ACM News

Rise Is Seen in Cyberattacks Targeting ­.s. Infrastructure

The top American military official responsible for defending the United States against cyberattacks said Thursday that there had been a 17-fold increase in computer...

Want To Find Jay-Z's Or Bill Gates' Private Jets? Openbarr Tracks 'untrackable' Flights
From ACM News

Want To Find Jay-Z's Or Bill Gates' Private Jets? Openbarr Tracks 'untrackable' Flights

Good news for paparazzi, stalkers, and corporate spies: "Private" jets are about to become significantly less private.

From ACM News

Gps Weakness Could Enable Mass Smartphone Hacking

Weaknesses in the technology that allows smartphone users to pinpoint themselves on a map, or check into restaurants and bars using apps such as Foursquare, could...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account