acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Idaho Laboratory Analyzed Stuxnet Computer Virus

Behind the doors of a nondescript red brick and gray building of the Idaho National Laboratory is the malware laboratory where government cyber experts analyzed...

From ACM News

In China, Business Travelers Take Extreme Precautions to Avoid Cyber-Espionage

Packing for business in China? Bring your passport and business cards, but maybe not that laptop loaded with contacts and corporate memos.

Authenticity of Web Pages ­nder Attack By Hackers
From ACM TechNews

Authenticity of Web Pages ­nder Attack By Hackers

The underlying security of the Internet is under attack, and security professionals have become very concerned about their ability to protect users' most sensitive...

The 'worm' That Could Bring Down the Internet
From ACM Opinion

The 'worm' That Could Bring Down the Internet

For the past three years, a highly encrypted computer worm called Conficker has been spreading rapidly around the world. As many as 12 million computers have...

From ACM News

Dhs Thinks Some Scada Problems Are Too Big To Call "bug"

The Stuxnet worm may be the most famous piece of malicious software ever written. When it was first detected, a little over a year ago, the worm sounded a warning...

Security Expert: ­.s. 'leading Force' Behind Stuxnet
From ACM News

Security Expert: ­.s. 'leading Force' Behind Stuxnet

German cybersecurity expert Ralph Langner warns that U.S. utility companies are not yet prepared to deal with the threat presented by the Stuxnet computer worm...

Software Upgrades Could Produce Self-Tuning Wireless Access Points, Researchers Say
From ACM TechNews

Software Upgrades Could Produce Self-Tuning Wireless Access Points, Researchers Say

University of Wisconsin, Madison researchers have developed Airshark, software that enables wireless access points to automatically detect radio-frequency interference...

From ACM News

Setting Boundaries For Internet Privacy

Watchful European privacy regulators are wielding increasing influence beyond the Continent’s borders.

'stingray' Phone Tracker Fuels Constitutional Clash
From ACM News

'stingray' Phone Tracker Fuels Constitutional Clash

For more than a year, federal authorities pursued a man they called simply "the Hacker." Only after using a little known cellphone-tracking device—a stingray—were...

From ACM News

Scientists ­se Brain Imaging to Reveal the Movies in Our Mind

Imagine tapping into the mind of a coma patient, or watching one’s own dream on YouTube. With a cutting-edge blend of brain imaging and computer simulation, scientists...

Fear of Repression Spurs Scholars and Activists to Build Alternate Internets
From ACM TechNews

Fear of Repression Spurs Scholars and Activists to Build Alternate Internets

Traction for the free-network movement is growing as activists, scholars, and entrepreneurs pursue efforts to repurpose existing online networks or create parallel...

Call It Your Online Driver's License
From ACM TechNews

Call It Your Online Driver's License

The White House's National Strategy for Trusted Identities in Cyberspace encourages the private-sector creation and public adoption of online user authentication...

Researchers to Detail Hole in Web Encryption
From ACM TechNews

Researchers to Detail Hole in Web Encryption

Security researchers Juliano Rizzo and Thai Duong will demonstrate an attack that compromises Transport Layer Security 1.0 at the Ekoparty conference in Argentina...

Success at 16
From Communications of the ACM

Success at 16

A high school student wins first prize from ACM for developing a faster keyboard layout.

Living in a Digital World
From Communications of the ACM

Living in a Digital World

Technology has created new opportunities to connect and interact. Yet, researchers are increasingly concerned that heavy technology usage is changing people's behavior...

From ACM News

Privacy at Risk: Who's Watching You?

The notion of Big Brother has been around for decades, but technology has long lagged behind the Orwellian imagination. Not any more; in the era of smartphones...

5 Game-Changing Ideas For Federal Cyber R&d
From ACM TechNews

5 Game-Changing Ideas For Federal Cyber R&d

The Leap-Ahead R&D & Coordination program is one of 12 initiatives included in the Comprehensive National Cybersecurity Initiatitive, which consists of several...

From ACM News

Hacking Made Easier, Thanks To New Tools

Time was when it took a fair amount of expertise to launch the kinds of illegal computer attacks that have become the hallmarks of "hacktivist" groups like Anonymous...

From ACM News

On the Internet, Nobody Knows You

Hackers have proven they can crack just about any computer network, from Sony’s to Citigroup’s. Afterward, they face another challenge: unloading the virtual...

Newly Published Cyber Security Report Identifies Key Research Priorities
From ACM TechNews

Newly Published Cyber Security Report Identifies Key Research Priorities

The U.K. National Center for Secure Information Technologies recently released a report identifying key research priorities for protecting the future Internet. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account