acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Iran Decodes U.S. Drone Intel
From ACM News

Iran Decodes U.S. Drone Intel

Senior Iranian military officials announced that the country's experts have decoded the intelligence gathering system and memory hard discs of the United States'...

Pentagon Looks to Dna from Plants to Foil Electronic Component Counterfeiters
From ACM News

Pentagon Looks to Dna from Plants to Foil Electronic Component Counterfeiters

Counterfeit electronics embedded in missile guidance systems and hundred-million-dollar aircraft have become a serious problem for the U.S. military and its contractors...

Going With the Flow: Google's Secret Switch to the Next Wave of Networking
From ACM News

Going With the Flow: Google's Secret Switch to the Next Wave of Networking

In early 1999, an associate computer science professor at UC Santa Barbara climbed the steps to the second floor headquarters of a small startup in Palo Alto, and...

Security Researcher ­nearths Plans For Iran's Halal Internet
From ACM News

Security Researcher ­nearths Plans For Iran's Halal Internet

Iran appears to have recently published a Persian-language "Request for Information" for an even-more filtered and monitored version of the Internet than what presently...

Medical Device Hack Attacks May Kill, Researchers Warn
From ACM News

Medical Device Hack Attacks May Kill, Researchers Warn

Karen Sandler has a big heart. And that's not just because she is head of the Gnome Foundation—a non-profit community group dedicated to making and giving away...

Digitally Possessed
From Communications of the ACM

Digitally Possessed

Virtual possessions play an increasingly important role in our daily lives. How we think about them and deal with them is changing the way we think and interact...

A Workshop Revival
From Communications of the ACM

A Workshop Revival

The success of Germany's Dagstuhl Seminars has inspired a proliferation of Dagstuhl-like venues, especially in India.

Toward a Modular Defense Against Hackers
From ACM TechNews

Toward a Modular Defense Against Hackers

Lehigh University professor Gang Tan has developed automated techniques to scan for errors in large software systems.  

Israel's Rocket-Hunting Ace Got His Start Playing Warcraft
From ACM News

Israel's Rocket-Hunting Ace Got His Start Playing Warcraft

While many of the boys in Idan Yahya's high school class were buffing up and preparing themselves for selection into elite combat units, this gawky teenager was...

Check Your Mac For Malware
From ACM News

Check Your Mac For Malware

Mac fans recently got a little taste of what it's like to be a Windows user.

Will We Ever Create a Perfect Lie Detector?
From ACM News

Will We Ever Create a Perfect Lie Detector?

To create machines that can always tell when someone is lying, we need to know much more about what goes on in our brains.

From ACM News

Iran Moving Ahead with Plans for National Intranet

Iran topped a recent list of repressive regimes that most aggressively restrict Internet freedom. The list, published by Reporters Without Borders, is a part of...

Beware Apps Bearing Unwanted Gifts
From ACM News

Beware Apps Bearing Unwanted Gifts

As companies increasingly allow workers to use personal smartphones and tablets on the job, they are confronting a potential new security threat: malicious software...

Researchers Release New Exploits to Hijack Critical Infrastructure
From ACM News

Researchers Release New Exploits to Hijack Critical Infrastructure

Researchers have released two new exploits that attack common design vulnerabilities in a computer component used to control critical infrastructure, such as refineries...

The Human Voice, as Game Changer
From ACM News

The Human Voice, as Game Changer

Vlad Sejnoha is talking to the TV again.

Watching and Waiting
From ACM News

Watching and Waiting

It is called an advanced persistent threat, and if it sounds like something out of a Tom Clancy novel, that's because it pretty much is.  

How China Blocks the Tor Anonymity Network
From ACM News

How China Blocks the Tor Anonymity Network

The Tor Project is a free network run by volunteers that hides users locations and usage from surveillance and traffic analysis.

Police Are Using Phone Tracking as a Routine Tool
From ACM News

Police Are Using Phone Tracking as a Routine Tool

Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials...

Cyber and Drone Attacks May Change Warfare More Than the Machine Gun
From ACM TechNews

Cyber and Drone Attacks May Change Warfare More Than the Machine Gun

Information technology is changing the way nations wage war, with philosophical and ethical perspectives struggling to keep pace with those changes.  

The Philosopher Whose Fingerprints Are All Over the Ftc's New Approach to Privacy
From ACM Opinion

The Philosopher Whose Fingerprints Are All Over the Ftc's New Approach to Privacy

A mile or two away from Facebook's headquarters in Silicon Valley, Helen Nissenbaum of New York University was standing in a basement on Stanford's campus explaining...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account