acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Silicon Valley Fighting Proposed Law Pushed By Hollywood

Silicon Valley is making one of its biggest lobbying pushes ever, as it fights a proposed law championed by Hollywood called the Stop Online Piracy Act. But whether...

New System Secures Cellphones For Web Transactions
From ACM TechNews

New System Secures Cellphones For Web Transactions

Password less authentication is an experimental two-factor authentication method designed to ensure the security of online transactions made via cell phones.

From ACM News

Will the Kinect 2 Be Able to Read Your Lips?

How will users hack this one? The Kinect is a device that inherently grows and expands: Microsoft itself has come around to acknowledging that the oft-hackedreally...

Underwater Drones Giving More Eyes to Police Harbor Unit as Searches Grow
From ACM News

Underwater Drones Giving More Eyes to Police Harbor Unit as Searches Grow

With President Obama in town last week, things were busy for the New York Police Department's Harbor Unit. Federal security agents were disseminating lists of...

In-Air Signature, New Authentication Technique For Mobile Phones
From ACM TechNews

In-Air Signature, New Authentication Technique For Mobile Phones

Researchers at Universidad Politecnica de Madrid's Group of Biometrics, Biosignals, and Security say they have developed a biometric authentication technique that...

Everything You Need to Know About Carrieriq
From ACM News

Everything You Need to Know About Carrieriq

"Carrier IQ" is a company that sells software to wireless companies that reports how well networks are performing in real-time, by sending performance data from...

Researchers Find Some Smartphone Models More Vulnerable to Attack
From ACM TechNews

Researchers Find Some Smartphone Models More Vulnerable to Attack

The preloaded applications of some smartphones specifically designed to support the Android mobile platform could make the devices more vulnerable to hackers, according...

From ACM News

Did Conficker Help Sabotage Iran Nuke Program?

A cyber warfare expert claims he has linked the Stuxnet computer virus that attacked Iran's nuclear program in 2010 to Conficker, a mysterious "worm" that surfaced...

Gchq Aims to Recruit Computer Hackers with Code-Cracking Web Site
From ACM Careers

Gchq Aims to Recruit Computer Hackers with Code-Cracking Web Site

Government intelligence service targets "self-taught" hackers with cryptic Web site that features no obvious branding.

The Search For Analysts to Make Sense of 'big Data'
From ACM News

The Search For Analysts to Make Sense of 'big Data'

Businesses keep vast troves of data about things like online shopping behavior, or millions of changes in weather patterns, or trillions of financial transactions—information...

From ACM News

Following Digital Breadcrumbs to 'big Data' Gold

What do Facebook, Groupon, and biotech firm Human Genome Sciences have in common? They all rely on massive amounts of data to design their products. Terabytes...

Cyber Security Must Focus on Users, Not Just Attackers
From ACM TechNews

Cyber Security Must Focus on Users, Not Just Attackers

Cybersecurity measures must aim at users, not just attackers, according to researchers at the University of Maryland, College Park's Maryland Cybersecurity Center...

Comedy of Errors Led to False 'water-Pump Hack' Report
From ACM News

Comedy of Errors Led to False 'water-Pump Hack' Report

It was the broken water pump heard 'round the world. Cyberwar watchers took notice this month when a leaked intelligence memo claimed Russian hackers had remotely...

From ACM News

Fliers Must Turn Off Devices, but It's Not Clear Why

Millions of Americans who got on a plane over the Thanksgiving holiday heard the admonition: "Please power down your electronic devices for takeoff."

Palantir, the War on Terror's Secret Weapon
From ACM News

Palantir, the War on Terror's Secret Weapon

A Silicon Valley startup that collates threats has quietly become indispensable to the U.S. intelligence community.

From ACM News

Cyber War Threatens Iran: Passive Defense Organization Chief

Until the next Iranian calendar year (which begins on March 20, 2012) cyber attacks will pose serious threats to Iran and that is why the Passive Defense Organization...

From ACM News

Cyberwar Storm Clouds Are Gathering

Cyberspace. Some call it the new domain of war, after land, sea, air, and space.

Millions of Printers Open to Devastating Hack Attack, Researchers Say
From ACM News

Millions of Printers Open to Devastating Hack Attack, Researchers Say

Could a hacker from half-way around the planet control your printer and give it instructions so frantic that it could eventually catch fire? Or use a hijacked...

Dod Looks to Make a Game of Software Testing
From ACM TechNews

Dod Looks to Make a Game of Software Testing

The U.S. Defense Advanced Research Projects Agency recently launched the Crowd Sourced Formal Verification project, which aims to use crowdsourcing technology to...

From ACM News

How Private Is Your Email? It Depends

Do the police need a warrant to read your email? Believe it or not, two decades into the Internet age, the answer to that question is still "maybe." It depends...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account