acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

I'm Being Followed: How Google

This morning, if you opened your browser and went to NYTimes.com, an amazing thing happened in the milliseconds between your click and when the news appeared on...

Et Tu, Google? Android Apps Can Also Secretly Copy Photos
From ACM News

Et Tu, Google? Android Apps Can Also Secretly Copy Photos

It's not just Apple. Photos are vulnerable on Android phones, too.

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says
From ACM News

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says

In the midst of an ongoing turf battle over how big a role the National Security Agency should play in securing the nation’s critical infrastructure, a Defense...

Despite Intrusions, Chances Of U.s.-China Cyberwar Are Small
From ACM News

Despite Intrusions, Chances Of U.s.-China Cyberwar Are Small

A panel of security and policy experts said that, despite dire warnings about the information warfare capabilities of China and other developing nations, the risk...

From ACM TechNews

Cryptographic Attack Highlights the Importance of Bug-Free Software

University of Bristol researchers have circumvented the security that OpenSSL should provide by targeting a bug in the software.  

From ACM News

How a Web Link Can Take Control of Your Phone

A chilling demonstration to a small, packed room at the RSA security conference showed how clicking a single bad Web link while using a phone running Google's Android...

From ACM News

DARPA Warns: Your Iphone Is a Military Threat

There’s a growing threat to the U.S. military, according to the Pentagon's premier research wing. No, it's not Iran’s nukes or China's missiles. It's the iPads,...

Defense Department Wants More Control Over the Internet
From ACM News

Defense Department Wants More Control Over the Internet

The U.S. Department of Defense may have funded the research that led to the Internet, but freewheeling innovation created the patchwork of privately owned technology...

Apple Loophole Gives Developers Access to Photos
From ACM TechNews

Apple Loophole Gives Developers Access to Photos

Application developers for Apple's mobile devices, already under fire for taking users' address book information without their knowledge, now are being accused...

Mit Takes Aim at Secure, Self-Healing Cloud
From ACM TechNews

Mit Takes Aim at Secure, Self-Healing Cloud

MIT researchers are studying how to build a cloud computing infrastructure that recognizes and eliminates a cyberattack under normal operating procedures.  

Bank Customers Favor Birthdate Pins
From ACM TechNews

Bank Customers Favor Birthdate Pins

The patterns that bank customers typically follow when choosing a four-digit PIN code gives hackers a 9 percent chance of correctly guessing their ATM code, according...

Nist Cybersecurity Center Tackles Public And Private Threats
From ACM TechNews

Nist Cybersecurity Center Tackles Public And Private Threats

The U.S. NIST has partnered with Maryland and Montgomery County, Md., to create the National Cybersecurity Center for Excellence, where NIST researchers will work...

From ACM News

Cryptosystems Showing Signs of 'wear and Tear'

It's been an interesting year in the cryptography world, with new attacks on several algorithms, continued problems with hash functions, and the recent research...

From ACM News

Appeals Court ­pholds Constitutional Right Against Forced Decryption

A federal appeals court has found a Florida man's constitutional rights were violated when he was imprisoned for refusing to decrypt data on several devices.

From ACM Opinion

The Coming Entanglement: Bill Joy and Danny Hillis

Digital innovators Bill Joy, co-founder of Sun Microsystems, and Danny Hillis, co-founder of the Long Now Foundation, talk with Scientific American Executive Editor...

"unethical" Html Video Copy Protection Proposal Draws Criticism from W3c Reps
From ACM News

"unethical" Html Video Copy Protection Proposal Draws Criticism from W3c Reps

A new Web standard proposal authored by Google, Microsoft, and Netflix seeks to bring copy protection mechanisms to the Web.

Stanford ­niversity Researchers Break Nucaptcha Video Security
From ACM News

Stanford ­niversity Researchers Break Nucaptcha Video Security

When it launched in 2010, NuCaptcha touted its proprietary technology as being able to "provide the highest level of security available" by using video streams...

Nash's Beautiful Mind Pre-Empted Million-Dollar Puzzle
From ACM News

Nash's Beautiful Mind Pre-Empted Million-Dollar Puzzle

John Nash's mind is even more exquisite than we thought. The Nobel laureate, famous for both his work in game theory and his schizophrenia—as portrayed in the book...

Computing With Magnets
From Communications of the ACM

Computing With Magnets

Researchers are finding ways to develop ultra-efficient and nonvolatile computer processors out of nanoscale magnets. A number of obstacles, however, stand in the...

Policing the Future
From Communications of the ACM

Policing the Future

Computer programs and new mathematical algorithms are helping law enforcement agencies better predict when and where crimes will occur.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account