acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Rebecca Mackinnon Discusses Threats to Internet Freedom: Part 1
From ACM News

Rebecca Mackinnon Discusses Threats to Internet Freedom: Part 1

Rebecca MacKinnon shares insights about Internet freedom, including the roles and responsibilities of citizens, corporations, and governments.  

Bypassing the Password
From ACM TechNews

Bypassing the Password

The U.S. Defense Advanced Research Projects Agency wants to see an alternative to passwords and is supporting work that would confirm a computer user's identity...

Cryptography Pioneer: We Need Good Code
From ACM TechNews

Cryptography Pioneer: We Need Good Code

Whitfield Diffie, a pioneer of public-key cryptography, told the recent Black Hat Europe conference that a good plan to secure software is needed in the age of...

Drones Over America: What Can They See?
From ACM News

Drones Over America: What Can They See?

Unmanned aircraft systems, or drones, have long played a role in military operations. But imagine thousands of drones flying over U.S. skies—something we may see...

Wireless Medical Monitors Transforming Patient Care
From ACM News

Wireless Medical Monitors Transforming Patient Care

It's hard to find a better example of how technology is revolutionizing patient care than the tiny edible sensor Proteus Biomedical of Redwood City plans to begin...

Ietf Explores New Working Group on Identity Management in the Cloud
From ACM TechNews

Ietf Explores New Working Group on Identity Management in the Cloud

The Internet Engineering Task Force is considering approving the Simple Cloud Identity Management scheme, which manages user identity in cloud-based applications...

U.s. Army to Soldiers: 'check-Ins' Can Kill
From ACM News

U.s. Army to Soldiers: 'check-Ins' Can Kill

While the U.S. Army knows its soldiers live in the modern world and carry location-aware, socially networked smartphones, it is reiterating the dangers of broadcasting...

Researchers Can't Identify Programming Language ­sed in Duqu, Ask For Help
From ACM TechNews

Researchers Can't Identify Programming Language ­sed in Duqu, Ask For Help

A large portion of the Duqu Trojan was written in an unusual programming language, according to malware experts at Kaspersky Lab.  

New Darpa Challenge Wants ­nique Algorithms For Space Applications
From ACM TechNews

New Darpa Challenge Wants ­nique Algorithms For Space Applications

DARPA will launch the Zero Robotics Autonomous Space Capture Challenge on March 28, a contest that asks participants to develop unique algorithms to control small...

How Hackers Are Caught Out By Law Enforcers
From ACM News

How Hackers Are Caught Out By Law Enforcers

The Internet has gained a reputation as somewhere you can say and do anything with impunity, primarily because it is easy to disguise your identity.

Cyberwar Is Already ­pon ­S
From ACM Opinion

Cyberwar Is Already ­pon ­S

In the nearly 20 years since David Ronfeldt and I introduced our concept of cyberwar, this new mode of conflict has become a reality.

Three Things that Scare Google
From ACM News

Three Things that Scare Google

Google Executive Chairman Eric Schmidt told a crowd of journalists Wednesday night that there are some things about technology and the Internet that scare him,...

Your Kinect Is Watching You
From ACM News

Your Kinect Is Watching You

There is a wave of concern—completely justified, to my mind—over the privacy implications of our increasing reliance on Facebook and Google. What most people don’t...

From ACM News

How a Web Link Can Take Control of Your Phone

A chilling demonstration to a small, packed room at the recent RSA security conference showed how clicking a single bad Web link while using a phone running Google's...

Eavesdropping Antennas Can Steal Your Smart Phone's Secrets
From ACM TechNews

Eavesdropping Antennas Can Steal Your Smart Phone's Secrets

Cryptography Research scientists have developed a method for a standard TV antenna, an amplifier, and specialized software to find the secret key being used by...

An App That Helps You Cozy ­p to Strangers
From ACM News

An App That Helps You Cozy ­p to Strangers

Paul Davison is in a hurry. Not just to board the plane that's about to take him to his father's retirement party in San Diego, or to get through the talking points...

Hackers Arrested as One Turns Witness
From ACM News

Hackers Arrested as One Turns Witness

Federal prosecutors brought charges against a group of men allegedly behind "LulzSec"—a globe-spanning collective of computer hackers who wreaked havoc on companies...

The Bright Side of Being Hacked
From ACM News

The Bright Side of Being Hacked

Hackers operating under the banner Anonymous have been poking a finger in the eye of one private company after another for two years now.  

Stuxnet: Computer Worm Opens New Era of Warfare
From ACM News

Stuxnet: Computer Worm Opens New Era of Warfare

For the past few months now, the nation's top military, intelligence and law enforcement officials have been warning Congress and the country about a coming cyberattack...

Why the Security Industry Never Actually Makes ­s Secure
From ACM News

Why the Security Industry Never Actually Makes ­s Secure

Every year, security vendors gather at the RSA conference here to reaffirm their commitment to fencing out hackers and keeping data safe. And every year, corporate...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account