acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Nbc, Google, Stage 'war Games' To Prepare For Olympic Disruptions
From ACM News

Nbc, Google, Stage 'war Games' To Prepare For Olympic Disruptions

NBC and Google are conducting "war games" in at least three countries, to prepare for the possibility of hacker attacks or hardware malfunction disrupting the online...

England V Germany: Goal-Line Technology Decision Imminent
From ACM News

England V Germany: Goal-Line Technology Decision Imminent

Football's world governing body Fifa and other organisations are preparing to vote on something many fans of the game have been crying out for: goal-line technology...

A Code of Conduct, For Drones?
From ACM News

A Code of Conduct, For Drones?

It's a bird. It's a plane. Actually, it's a drone. And now those unmanned aircraft, best known for being used by the U.S. to kill terrorism suspects overseas, have...

Your E-Book Is Reading You
From ACM News

Your E-Book Is Reading You

It takes the average reader just seven hours to read the final book in Suzanne Collins's "Hunger Games" trilogy on the Kobo e-reader—about 57 pages an hour.

Researchers ­se Spoofing to 'hack' Into a Flying Drone
From ACM News

Researchers ­se Spoofing to 'hack' Into a Flying Drone

American researchers took control of a flying drone by hacking into its GPS system—acting on a $1,000 (£640) dare from the U.S. Department of Homeland Security.

Computer Scientists Break Security Token Key in Record Time
From ACM TechNews

Computer Scientists Break Security Token Key in Record Time

A group of computer scientists dubbed Team Prosecco says it has found a way to extract a security key from a widely used RSA electronic token in 13 minutes.  

Building an Army of Ones and Zeros and the Troops Who Know How to Wield Them
From ACM TechNews

Building an Army of Ones and Zeros and the Troops Who Know How to Wield Them

Intrinsic to the U.S. Pentagon's development of cyberarsenals is the challenge of staffing the Cyber Command.  

Blade Runner: Which Predictions Have Come True?
From ACM News

Blade Runner: Which Predictions Have Come True?

Based on Do Androids Dream of Electric Sheep? by Philip K Dick, Ridley Scott's Blade Runner—the tale of a hunt for four dangerous "replicant" humans—is a classic...

Researchers Advance Biometric Security
From ACM TechNews

Researchers Advance Biometric Security

A biometric security system developed by researchers at the University of Calgary can simulate the way the brain makes decisions about information from different...

Finalists in Microsoft's $250k Contest Take on 'most-Pressing' Exploit Tactic
From ACM TechNews

Finalists in Microsoft's $250k Contest Take on 'most-Pressing' Exploit Tactic

Microsoft announced that each of the three finalists in its $250,000 BlueHat Prize security contest came up with different solutions for blocking return-oriented...

U.s. Military Hunts For Safe Smartphones For Soldiers
From ACM News

U.s. Military Hunts For Safe Smartphones For Soldiers

The military has long needed computers that are tough enough on the outside to withstand the rough and tumble of the battlefield. Now, with the proliferation of...

Minister: Iran Ready to Repel Enemies' Cyber Attacks
From ACM News

Minister: Iran Ready to Repel Enemies' Cyber Attacks

Iranian Intelligence Minister Heidar Moslehi underscored on Thursday that the country is completely ready for defending its sensitive facilities against enemies'...

Why Faces Matter to Facebook
From ACM Opinion

Why Faces Matter to Facebook

Facebook really wants to know what you look like.

Research Reveals Why Spammers Claim They're Nigerian
From ACM News

Research Reveals Why Spammers Claim They're Nigerian

Most of us know the signs: stilted English, "Dear Sir/Madam," a particular fondness for exclamation points.

Captcha-Busting Villains Branch Out From Spam Into Id Theft
From ACM TechNews

Captcha-Busting Villains Branch Out From Spam Into Id Theft

A recent Imperva study found that cybercriminals are using Completely Automated Public Turing Tests to Tell Computers and Humans Apart circumvention techniques...

Degrees of Separation
From Communications of the ACM

Degrees of Separation

Researchers now have the capability to look at the small-world problem from both the traditional algorithmic approach and the new topological approach.

Patently Inadequate
From Communications of the ACM

Patently Inadequate

The biggest change to U.S. patent law in nearly 60 years brings many changes, but fails to solve the software industry's most vexing problems.

Lost and Found
From Communications of the ACM

Lost and Found

Researchers discover computer pioneer Konrad Zuse's long-forgotten Z9, the world's first program-controlled binary relay calculator using floating-point arithmetic...

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say
From ACM News

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed...

How the U.S. Can Avoid a 'Cyber Cold War'
From ACM TechNews

How the U.S. Can Avoid a 'Cyber Cold War'

Former White House cybersecurity coordinator Howard Schmidt says there is a fine line to negotiate between pushing central values such as freedom of speech without...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account