acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

­.s. Debated Cyberwarfare in Attack Plan on Libya

Just before the American-led strikes against Libya in March, the Obama administration intensely debated whether to open the mission with a new kind of warfare...

Founding Father Wants Secure 'internet 2'
From ACM TechNews

Founding Father Wants Secure 'internet 2'

A new version of the Internet might be the best way to defend against cyberattacks, says Internet co-founder Vint Cerf. 

Air Force Insists: Drone Cockpit Virus Just a 'nuisance'
From ACM News

Air Force Insists: Drone Cockpit Virus Just a 'nuisance'

The U.S. Air Force revealed new details Wednesday about the virus that’s been infecting the remote cockpits of its drone fleet—and insisted, despite reports from...

From ACM News

Popular Websites Share ­ser Information, Email Addresses, Stanford Study Finds

By signing onto many of the most popular sites on the Web, you may be unknowingly sharing your email address or name with other websites and data collection companies...

From ACM News

Government Aims to Build a 'Data Eye in the Sky'

More than 60 years ago, in his "Foundation" series, the science fiction novelist Isaac Asimov invented a new science—psychohistory—that combined mathematics and...

From ACM News

Gadgets the Pentagon Made

The cool voice assistant that runs on the iPhone 4S? Years ago, someone thought what Apple calls Siri would be a valuable tool for the military. Come to think...

U.s., Russia Slowly Improve Cybersecurity Cooperation
From ACM TechNews

U.s., Russia Slowly Improve Cybersecurity Cooperation

Cooperation between the United States and Russia on cybersecurity issues is gradually improving, as indicated by increasing interaction between experts at events...

From ACM News

Coming Soon: The Drone Arms Race

At the Zhuhai air show in southeastern China last November, Chinese companies startled some Americans by unveiling 25 different models of remotely controlled aircraft...

Computer Virus Hits U.s. Drone Fleet
From ACM News

Computer Virus Hits U.s. Drone Fleet

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over Afghanistan...

Texas Computer Scientist Outflanks Next-Generation Computer Viruses
From ACM TechNews

Texas Computer Scientist Outflanks Next-Generation Computer Viruses

University of Texas at Dallas researchers have developed a method for anticipating the actions of computer viruses, which could lead to a new generation of tools...

From ACM News

White House Orders New Computer Security Rules

The White House plans to issue an executive order on Friday to replace a flawed patchwork of computer security safeguards exposed by the disclosure of hundreds...

From ACM News

How Many Security Clearances Have Been Issued?

More than 4.2 million people have security clearances for access to classified information, a number that vastly outstrips previous estimates and nearly rivals...

Xss Web Attacks Could Live Forever, Researcher Warns
From ACM TechNews

Xss Web Attacks Could Live Forever, Researcher Warns

If browsers do not provide a mechanism for Web sites to securely recover from certain cross-site scripting attacks, the attacks could become invincible and the...

Idaho Lab in a Race to Shore Up Critical Infrastructure Systems
From ACM News

Idaho Lab in a Race to Shore Up Critical Infrastructure Systems

All it took was one click of a mouse from the CEO of the ACME Chemical company.

Army Tracking Plan: Drones That Never Forget a Face
From ACM News

Army Tracking Plan: Drones That Never Forget a Face

Perhaps the idea of spy drones already makes your nervous. Maybe you’re uncomfortable with the notion of an unblinking, robotic eye in the sky that can watch...

From ACM TechNews

Idaho Laboratory Analyzed Stuxnet Computer Virus

The U.S. government turned to cyberexperts at the Idaho National Laboratory to analyze the Stuxnet computer virus when it first came out. 

Supreme Court Docket: Surveillance, Profanity, and Thought Patents
From ACM News

Supreme Court Docket: Surveillance, Profanity, and Thought Patents

The Supreme Court’s 2011–2012 term began Oct. 3 with arguments on the docket concerning everything from television profanity to warrantless GPS surveillance.

From ACM News

What to Do If You've Been Hacked

It's a nightmare scenario every business fears. Your tech department has spotted suspicious activity on the company network. Your customers and employees are...

Argonne Researchers 'hack' Diebold E-Voting System
From ACM TechNews

Argonne Researchers 'hack' Diebold E-Voting System

Argonne National Laboratory researchers recently demonstrated how the Diebold Accuvote TS machine can be hacked using inexpensive, widely available electronic...

Which Telecoms Store Your Data the Longest? Secret Memo Tells All
From ACM News

Which Telecoms Store Your Data the Longest? Secret Memo Tells All

The nation’s major mobile-phone providers are keeping a treasure trove of sensitive data on their customers, according to newly released Justice Department internal...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account