acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Gov. Cuomo Uses Blackberry Pin-to-Pin Messaging System to Contact Key Staffers When They Can't Talk on the Phone
From ACM News

Gov. Cuomo Uses Blackberry Pin-to-Pin Messaging System to Contact Key Staffers When They Can't Talk on the Phone

There's one phrase Gov. Cuomo never hears: "You’ve got mail!" 

How Google Is Becoming an Extension of Your Mind
From ACM Opinion

How Google Is Becoming an Extension of Your Mind

It's time to think of Google as much more than just a search engine, and that should both excite and spook you.

Cyberwarfare, Conservation and Disease Prevention Could Benefit From MU Researcher's Network Model
From ACM TechNews

Cyberwarfare, Conservation and Disease Prevention Could Benefit From MU Researcher's Network Model

University of Missouri researchers have developed a computer model they say could have wide-reaching applications in cyberwarfare, conservation, and disease prevention...

New Notre Dame Research Raises Questions About Iris Recognition Systems
From ACM TechNews

New Notre Dame Research Raises Questions About Iris Recognition Systems

Since iris recognition technologies were first developed, it has been assumed that a person's iris remained stable over their lifetime, which is known as “one enrollment...

The Death of Cash
From ACM News

The Death of Cash

Café Grumpy is the kind of hipster hangout that wouldn't deign to trumpet itself.

'clonewise' Security Service Helps Identify Vulnerable Code
From ACM TechNews

'clonewise' Security Service Helps Identify Vulnerable Code

Deakin University researchers have developed Clonewise, a service for finding common code in programs, which could help find vulnerable libraries built into larger...

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks
From ACM News

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks

John Sublett and his colleagues had an audacious, digital-age plan. They wanted to use the Internet to enable businesses to manage any kind of electronic device...

From ACM News

In Modern Scandal, an Email Is Forever

When ousted Barclays CEO Bob Diamond says he felt "physically ill" reading emails of his traders crowing over interest rate manipulation, he is almost certainly...

The Drone Zone
From ACM News

The Drone Zone

Holloman Air Force Base, at the eastern edge of New Mexico's White Sands Missile Range, 200 miles south of Albuquerque, was once famous for the daredevil maneuvers...

­.s. ­rged to Recruit Master Hackers to Wage Cyber War on Al-Qaida
From ACM News

­.s. ­rged to Recruit Master Hackers to Wage Cyber War on Al-Qaida

Instead of prosecuting elite computer hackers, the U.S. government should recruit them to launch cyber-attacks against Islamist terrorists and other foes, according...

Cybercriminals Sniff Out Vulnerable Firms
From ACM News

Cybercriminals Sniff Out Vulnerable Firms

With cybercriminals a greater threat to small businesses than ever before, more entrepreneurs like Lloyd Keilson are left asking themselves who is to blame for...

Big Data and the Changing Economics of Privacy
From ACM News

Big Data and the Changing Economics of Privacy

There was a time when only people with money to hire a detective could dig into someone’s life. Now, dozens of companies have sprung up that will prowl into a person’s...

Pentagon Digs In on Cyberwar Front
From ACM News

Pentagon Digs In on Cyberwar Front

The U.S. military is accelerating its cyberwarfare training programs in an aggressive expansion of its preparations for conflict on an emerging battlefield.

Developing Situational Awareness
From ACM TechNews

Developing Situational Awareness

Carnegie Mellon University's Ed Stoner says the ability to monitor large networks and analyze bulk data collections from various sources is crucial to allowing...

U.s. Spy Agencies Say Won't Read Americans' Email For Cybersecurity
From ACM News

U.s. Spy Agencies Say Won't Read Americans' Email For Cybersecurity

The head of the U.S. spy agency that eavesdrops on electronic communications overseas sought on Monday to reassure Americans that the National Security Agency would...

Drone Hijacking? That
From ACM News

Drone Hijacking? That

On the evening of June 19, a group of researchers from the University of Texas successfully hijacked a civilian drone at the White Sands Missile Range in New Mexico...

Hackers Steal BMWs in 3 Minutes Using Security Loophole
From ACM News

Hackers Steal BMWs in 3 Minutes Using Security Loophole

There has been an unusual spike in the number of BMWs stolen in the U.K. this year, with some sources suggesting the number may be 300 cars or higher. The cars...

Google Shaman Explains Mysteries of 'compute Engine'
From ACM News

Google Shaman Explains Mysteries of 'compute Engine'

Google started work on the Google Compute Engine over a year and a half ago, and it was all Peter Magnusson could do to keep his mouth shut.

Mind Control Moves Into Battle
From ACM News

Mind Control Moves Into Battle

Technology that taps into a soldier's thought patterns could soon see action on the battlefield.

Is ­.s. Government Reading Email Without a Warrant?
From ACM News

Is ­.s. Government Reading Email Without a Warrant?

Does the U.S. government read your email? It's a simple question, but apparently there's no simple answer. And the Justice Department and the Internal Revenue Service...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account