acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Science Fiction-Style Sabotage a Fear in New Hacks
From ACM TechNews

Science Fiction-Style Sabotage a Fear in New Hacks

The U.S. Cyber Consequences Unit, a nonprofit group that helps the U.S. government identify vulnerabilities for cyberattacks, has replicated the recent attack that...

Professor Steven Bellovin Discusses Computer Security
From ACM TechNews

Professor Steven Bellovin Discusses Computer Security

Columbia University professor Steven Bellovin says in an interview that he is working on the idea of private search, which allows users to work together, but not...

Are Drones Creating a New Global Arms Race?
From ACM News

Are Drones Creating a New Global Arms Race?

Plastic tanks and miniature models of fighter jets are on display in Steven Zaloga's home office, and his bookshelves are overflowing with volumes about the history...

Cloud Computing: Gaps in the 'cloud'
From ACM TechNews

Cloud Computing: Gaps in the 'cloud'

Ruhr-University Bochum researchers discovered a massive security gap at Amazon Cloud Services and presented their findings at the recent ACM Cloud Computing Security...

How Revolutionary Tools Cracked a 1700s Code
From ACM News

How Revolutionary Tools Cracked a 1700s Code

It has been more than six decades since Warren Weaver, a pioneer in automated language translation, suggested applying code-breaking techniques to the challenge...

The Shocking Strangeness of Our 25-Year-Old Digital Privacy Law
From ACM Opinion

The Shocking Strangeness of Our 25-Year-Old Digital Privacy Law

The Electronic Communications Privacy Act (ECPA) was signed into law on October 21, 1986. Although it was forward-looking at the time, ECPA's privacy protections...

Risky Business
From Communications of the ACM

Risky Business

Governments, companies, and individuals have suffered an unusual number of highly publicized data breaches this year. Is there a solution?

Hacking Cars
From Communications of the ACM

Hacking Cars

Researchers have discovered important security flaws in modern automobile systems. Will car thieves learn to pick locks with their laptops?

Virginia Tech Cybersecurity Breakthrough Keeps Sensitive Data Confined in Physical Space, Engineering Team Says
From ACM TechNews

Virginia Tech Cybersecurity Breakthrough Keeps Sensitive Data Confined in Physical Space, Engineering Team Says

Virginia Tech researchers have developed new security features that can remotely place smartphones under lockdown. 

From ACM News

Faq on Son of Stuxnet

What is Duqu? Duqu (pronounced dyu kyu) is primarily a remote-access Trojan targeted at a limited number of organizations in Europe, Africa, and the Middle East...

How Google's Self-Driving Car Works
From ACM News

How Google's Self-Driving Car Works

Once a secret project, Google's autonomous vehicles are now out in the open, quite literally, with the company test-driving them on public roads and, on one occasion...

Georgia Tech Turns Iphone Into Spiphone
From ACM News

Georgia Tech Turns Iphone Into Spiphone

It's a pattern that no doubt repeats itself daily in hundreds of millions of offices around the world: People sit down, turn on their computers, set their mobile...

From ACM News

Robot Wars 'Still a Long Way Off'

"I'll be back" said Arnold Schwarzenegger as cyborg-assassin the Terminator, back from the year 2029 to carry out a murder in 1984. But it seems that, when it...

From ACM TechNews

'son of Stuxnet' Virus Could Be Used to Attack Critical Computers Worldwide

Symantec researchers have discovered a new virus, Duqu, that they say is very similar to the Stuxnet virus that was used to attack Iran's nuclear program. 

Secure Android Kernel Could Make For 'classified' Smart Phones
From ACM TechNews

Secure Android Kernel Could Make For 'classified' Smart Phones

Researchers at George Mason University, the U.S. National Security Agency, and Google have developed a hardened kernel for the Android 3.0 operating system that...

From ACM News

Making Cars More Hacker-Proof

Computer security companies and researchers have dedicated a lot of time and money to testing the virtual padlocks on your online accounts. Some are now focusing...

From ACM News

New Malicious Program by Creators of Stuxnet Is Suspected

The designers of Stuxnet, the computer worm that was used to vandalize an Iranian nuclear site, may have struck again, security researchers say.

From ACM News

Transcending Borders but Not Laws

As cloud computing spreads data around the globe, a haze of legal and privacy questions follows.

Preventing a Pearl Harbor of Cyberspace
From ACM News

Preventing a Pearl Harbor of Cyberspace

At a time when the Internet has been inextricably linked to our national infrastructure, there are understandably serious concerns about the ability of the U.S...

Georgia Tech Releases Cyber Threats Forecast For 2012
From ACM TechNews

Georgia Tech Releases Cyber Threats Forecast For 2012

A new report warns that 2012 will feature new and increasingly sophisticated means to capture and exploit user data, as well as escalating battles over the control...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account