acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Latest Threat: A Virus Made Just For You
From ACM TechNews

The Latest Threat: A Virus Made Just For You

Georgia Tech's Paul Royal has shown that a newly refined technique could make automated analysis of malware nearly impossible, and he plans to reveal his work at...

Madi Malware: Advanced Persistent Threat or Just a Threat?
From ACM TechNews

Madi Malware: Advanced Persistent Threat or Just a Threat?

When Kaspersky Labs announced its discovery and monitoring of the Madi malware, it was quickly labeled by many as an advanced persistent threat, which initiated...

DARPA-Funded Researcher Can Take Over Android And Nokia Phones By Merely Waving Another Device Near Them
From ACM News

DARPA-Funded Researcher Can Take Over Android And Nokia Phones By Merely Waving Another Device Near Them

Smartphones' growing adoption of so-called "near field communications" promises to let the device in your pocket wirelessly make payments, beam info to other phones...

Micro-Drones: The New Face of Cutting-Edge Warfare
From ACM News

Micro-Drones: The New Face of Cutting-Edge Warfare

Micro-aerial vehicles (MAVs) with uncanny navigation and real-time mapping capabilities could soon be zipping through indoor and outdoor spaces, running reconnaissance...

Broader Horizons
From Communications of the ACM

Broader Horizons

ACM's Committee for Women in Computing (ACM-W) is widening its reach to involve women in industry as well as academia, including community college faculty and students...

Advertising Gets Personal
From Communications of the ACM

Advertising Gets Personal

Online behavioral advertising and sophisticated data aggregation have changed the face of advertising and put privacy in the crosshairs.

DARPA Shredder Challenge Solved
From Communications of the ACM

DARPA Shredder Challenge Solved

The eight-person winning team used original computer algorithms to narrow the search space and then relied on human observation to move the pieces into their final...

Cosmic Simulations
From Communications of the ACM

Cosmic Simulations

With the help of supercomputers, scientists are now able to create models of large-scale astronomical events.

New Lab Working on Security Shoe Sole to ID People
From ACM TechNews

New Lab Working on Security Shoe Sole to ID People

Carnegie Mellon University researchers are developing shoe insoles that can help monitor access to high-security areas. Sensors in the "bio-soles" check the pressure...

Russia's Top Cyber Sleuth Foils ­S Spies, Helps Kremlin Pals
From ACM Opinion

Russia's Top Cyber Sleuth Foils ­S Spies, Helps Kremlin Pals

It's early February in Cancun, Mexico. A group of 60 or so financial analysts, reporters, diplomats, and cybersecurity specialists shake off the previous night's...

­.k. Government Calls on Academia to Train Tomorrow's Cyber Security Experts
From ACM TechNews

­.k. Government Calls on Academia to Train Tomorrow's Cyber Security Experts

The U.K. government's Engineering and Physical Sciences Research Council has invited universities to apply for grants to run two new dedicated Centers for Doctoral...

Apple Warms Up to Hackers, Plans Presentation at Black Hat
From ACM News

Apple Warms Up to Hackers, Plans Presentation at Black Hat

In the 15 years that computer hackers have gathered in Las Vegas for the Black Hat conference, an event where unknowns can become stars and tech heavyweights are...

Nacl to Give Way to Rocksalt
From ACM TechNews

Nacl to Give Way to Rocksalt

Harvard University researchers have developed RockSalt, software that can boost the security and enhance the performance of commonly used Web and mobile applications...

Minister Stresses Iran's Ability to Confront All Spy Malwares
From ACM News

Minister Stresses Iran's Ability to Confront All Spy Malwares

Iran's Minister of Communication and Information Technology Reza Taqipour announced that Iran has successfully confronted sophisticated spy malwares and thwarted...

Gps Hijacking Catches Feds, Drone Makers Off Guard
From ACM News

Gps Hijacking Catches Feds, Drone Makers Off Guard

On June 19, when University of Texas researchers successfully hijacked a drone by "spoofing" it— giving it bad GPS coordinates–they showed the Department of Homeland...

Newest U.s. Counterterrorism Strategy: Trolling
From ACM News

Newest U.s. Counterterrorism Strategy: Trolling

In the decade since 9/11, the U.S. government has used a wide variety of tactics against terrorists.

Microsoft, Juniper, Others in Coding Consortium Issue Guidelines For Safer Applications
From ACM TechNews

Microsoft, Juniper, Others in Coding Consortium Issue Guidelines For Safer Applications

The Software Assurance Forum for Excellence in Code recently issued "Practical Security Stories and Security Tasks for Agile Development Environments," a white...

Aclu: 'reasonable Suspicion' Not Good Enough For Gps Tracking
From ACM News

Aclu: 'reasonable Suspicion' Not Good Enough For Gps Tracking

If you're a student of the privacy and tech law worlds (or you just read Ars) then you're probably familiar with last year's Supreme Court decision, Jones v. United...

Western Media Seeking to Play Down Iran's Cyber Capability By New Virus Story
From ACM Opinion

Western Media Seeking to Play Down Iran's Cyber Capability By New Virus Story

The western media sought to play down Iran's cyber and computer software capability by releasing hundreds of reports on the discovery of a new computer virus and...

Mahdi, the Messiah, Found Infecting Systems in Iran, Israel
From ACM News

Mahdi, the Messiah, Found Infecting Systems in Iran, Israel

Who knew that when the Messiah arrived to herald the Day of Judgment he'd first root through computers to steal documents and record conversations?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account