acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Microsoft Researchers Say Anonymized Data Isn't So Anonymous
From ACM TechNews

Microsoft Researchers Say Anonymized Data Isn't So Anonymous

Data routinely gathered in Web logs, such as IP address, cookies, operating systems, browser type, and user-agent strings can threaten online privacy because they...

Researchers Find Evidence of Viruses Infecting Worms Creating New Form of Malware
From ACM TechNews

Researchers Find Evidence of Viruses Infecting Worms Creating New Form of Malware

A worm infected with a virus could be more dangerous than either alone and more difficult to detect with traditional software programs, say Softwin researchers,...

DARPA-Funded Hacker's Tiny $50 Spy Computer Hides in Offices, Drops From Drones
From ACM TechNews

DARPA-Funded Hacker's Tiny $50 Spy Computer Hides in Offices, Drops From Drones

A U.S. Defense Advanced Research Projects Agency researcher has developed the Falling or Ballistically-launched Object that Makes Backdoors (F-BOMB), a sensor-equipped...

From ACM News

Telepathy Machine Reconstructs Speech from Brainwaves

When you read this sentence to yourself, it's likely that you hear the words in your head. Now, in what amounts to technological telepathy, others are on the verge...

Smarter Password Checker Lets You Compare With Others
From ACM TechNews

Smarter Password Checker Lets You Compare With Others

Researchers have developed a system designed to rate passwords relative to those already stored in a Web site's database. The password checker can tell users if...

Political Borders Don't Stop Cyberattacks, But They Prevent Defense, Study Finds
From ACM TechNews

Political Borders Don't Stop Cyberattacks, But They Prevent Defense, Study Finds

Real-world political borders are hindering the defense of cyberspace, according to McAfee's new Cyber Defense Report. A dearth of common standards of behavior,...

From ACM News

Hacking Cars to Keep Them Safe

Tiffany Rad got interested in hacking cars because she wanted to drive her Land Rover off-road on rugged terrain without worrying about setting off the air bags...

From ACM News

What The Fbi Wants In A Social Media Monitoring App

The FBI has raised eyebrows in the tech world with a public document that asks for advice on how to harvest information from social networking sites.

From ACM News

Build ­p Your Phone's Defenses Against Hackers

Chuck Bokath would be terrifying if he were not such a nice guy. A jovial senior engineer at the Georgia Tech Research Institute in Atlanta, Mr. Bokath can hack...

From ACM News

Pursuing Iphone Thief, Officer Knew Right Buttons to Push

As crime-solving tools go, it may not have the same pedigree as, say, the oversize magnifying glass.

From ACM News

Humans Lose, Robots Win in New Defense Budget

The big loser in the Pentagon’s new budget? Ordinary human beings.

From ACM News

Fbi Plans Social Network Map Alert Mash-­p Application

The FBI is seeking to develop an early-warning system based on material "scraped" from social networks.

From ACM News

What If a Virus Infected a Virus? 'frankenware' Spotted By Security Firm

It does happen, says security firm BitDefender, and the result is more mutant than mutt.

From ACM News

Serious Flaw Emerges In Quantum Cryptography

The perfect secrecy offered by quantum mechanics appears to have been scuppered by a previously unknown practical problem, say physicists.

From ACM News

10k Reasons to Worry About Critical Infrastructure

A security researcher was able to locate and map more than 10,000 industrial control systems hooked up to the public internet, including water and sewage plants...

DARPA Set to Develop Super-Secure 'cognitive Fingerprint'
From ACM TechNews

DARPA Set to Develop Super-Secure 'cognitive Fingerprint'

U.S. Defense Advanced Research Projects Agency researchers are developing security technologies that go beyond recognizing complex passwords.  

From ACM News

Google Wants Ability to 'combine' Your ­ser Data

Google is planning to rewrite its privacy policy to grant it explicit rights to "combine personal information" across multiple products and services, the company...

From ACM News

Warrants Needed For Gps Monitoring, Supreme Court Rules

The Supreme Court ruled unanimously Monday that law enforcement authorities need a probable-cause warrant from a judge to affix a GPS device to a vehicle and monitor...

ACM Fellows Inducted
From Communications of the ACM

ACM Fellows Inducted

Forty-six men and women are recognized as 2011 ACM Fellows.

The War Against Botnets
From Communications of the ACM

The War Against Botnets

Increasingly sophisticated botnets have emerged during the last several years. However, security researchers, businesses, and governments are attacking botnets...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account