acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks
From ACM News

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks

It began as a hobby for a ­teenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet.

The Biometric Wallet
From ACM TechNews

The Biometric Wallet

Hitachi and Fujitsu have pioneered a new technique in which a person's vein configurations are scanned as proof of identity, and the technology is being integrated...

From ACM News

Intel Community's Sharing of Cyber Tools Raises Legal Questions

Before the establishment of U.S. Cyber Command in 2010, a combatant commander who wanted to take down an enemy’s surface-to-air missile sites or other defenses...

System Improves Automated Monitoring of Security Cameras
From ACM TechNews

System Improves Automated Monitoring of Security Cameras

MIT researchers have developed a system that can analyze several surveillance cameras more accurately and in less time than it would take a human operator.  

Is It Possible to Wage a Just Cyberwar?
From ACM Opinion

Is It Possible to Wage a Just Cyberwar?

In the last week or so, cyberwarfare has made front-page news: the United States may have been behind the Stuxnet cyberattack on Iran; Iran may have suffered another...

Stuxnet Expert Calls ­.s. the 'good Guys' in Cyber-Warfare
From ACM Opinion

Stuxnet Expert Calls ­.s. the 'good Guys' in Cyber-Warfare

Sitting in the front row for the first full day of the International Conference on Cyber Conflict was one of the industry’s foremost "rock star" researchers, ...

Nations Must Talk to Halt 'cyber Terrorism': Kaspersky
From ACM Opinion

Nations Must Talk to Halt 'cyber Terrorism': Kaspersky

Eugene Kaspersky, whose lab discovered the Flame virus that has attacked computers in Iran and elsewhere in the Middle East, said on Wednesday only a global effort...

Cyberthreats Turn Into Megabucks
From ACM Careers

Cyberthreats Turn Into Megabucks

As Congress boosts spending on cybersecurity and mulls over new data safety requirements on private industry, some companies stand to get rich.

Cyber-Attack Concerns Raised Over Boeing 787 Chip's 'back Door'
From ACM News

Cyber-Attack Concerns Raised Over Boeing 787 Chip's 'back Door'

Two Cambridge experts have discovered a "back door" in a computer chip used in military systems and aircraft, such as the Boeing 787, that could allow the chip...

Idf Admits to Using Cyber Space to Attack Enemies
From ACM News

Idf Admits to Using Cyber Space to Attack Enemies

The IDF uses cyber space to gather intelligence, attack enemies, and conduct various military operations, the military revealed on Sunday in a posting on its official...

Could Ears Be the Perfect Biometric?
From ACM TechNews

Could Ears Be the Perfect Biometric?

Ear identification could provide as distinctive a form of identification as fingerprints, says University of Southampton's Mark Nixon.  

From ACM News

Iran: 'flame' Virus Fight Began with Oil Attack

Computer technicians battling to contain a complex virus last month resorted to the ultimate firewall measures—cutting off Internet links to Iran’s Oil Ministry...

Iran 'finds Fix' For Sophisticated Flame Malware
From ACM News

Iran 'finds Fix' For Sophisticated Flame Malware

Iran says it has developed tools that can defend against the sophisticated cyber attack tool known as Flame.

Researchers Propose Way to Thwart Fraudulent Digital Certificates
From ACM TechNews

Researchers Propose Way to Thwart Fraudulent Digital Certificates

Security researchers Moxie Marlinspike and Trevor Perrin say an extension to the transport layer security protocol could help address spoofing attacks on the Secure...

From ACM News

Was Flame Virus that Invaded Iran's Computer Networks Made in ­sa?

As the United Nations and Iran warn that the newly discovered Flame computer virus may be the most potent weapon of its kind, U.S. computer security experts tell...

Shots Fired, Pinpointed and Argued Over
From ACM News

Shots Fired, Pinpointed and Argued Over

 At 7:22:07 p.m. on a recent Thursday, an electronic alarm went off in the soundproof control room of a suburban office building here.

What Fearmongers Get Wrong About Cyberwarfare
From ACM Opinion

What Fearmongers Get Wrong About Cyberwarfare

Should we worry about cyberwarfare? Judging by excessively dramatic headlines in the media, very much so. Cyberwarfare, the argument goes, might make wars easier...

Meet 'flame,' The Massive Spy Malware Infiltrating Iranian Computers
From ACM News

Meet 'flame,' The Massive Spy Malware Infiltrating Iranian Computers


Researchers 'map' Android Malware Genome
From ACM TechNews

Researchers 'map' Android Malware Genome

North Carolina State University's Android Malware Genome Project is a malware-sharing initiative aimed at encouraging more collaboration on a new generation of...

High Court to Hear Warrantless Eavesdropping Challenge
From ACM News

High Court to Hear Warrantless Eavesdropping Challenge

The Supreme Court agreed Monday to decide whether to halt a legal challenge to a once-secret warrantless surveillance program targeting Americans' communications...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account