acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Fbi's 'sabu' Hacker Was a Model Informant
From ACM News

Fbi's 'sabu' Hacker Was a Model Informant

As soon as he was caught, an influential computer hacker agreed to become a government informant and "literally worked around the clock" to help federal agents...

Your Kinect Is Watching You
From ACM News

Your Kinect Is Watching You

There is a wave of concern—completely justified, to my mind—over the privacy implications of our increasing reliance on Facebook and Google. What most people don’t...

From ACM News

How a Web Link Can Take Control of Your Phone

A chilling demonstration to a small, packed room at the recent RSA security conference showed how clicking a single bad Web link while using a phone running Google's...

The First Google Maps War
From ACM News

The First Google Maps War

Did Google Maps almost cause a war in 2010? On Nov. 3 of that year, Edén Pastora, the Nicaraguan official tasked with dredging the Rio San Juan, justified his country's...

Stakeout: How the Fbi Tracked and Busted a Chicago Anon
From ACM News

Stakeout: How the Fbi Tracked and Busted a Chicago Anon

"Script kiddie." No hacker worth his salt wants to hear the term used to describe him.

Hackers Arrested as One Turns Witness
From ACM News

Hackers Arrested as One Turns Witness

Federal prosecutors brought charges against a group of men allegedly behind "LulzSec"—a globe-spanning collective of computer hackers who wreaked havoc on companies...

The Bright Side of Being Hacked
From ACM News

The Bright Side of Being Hacked

Hackers operating under the banner Anonymous have been poking a finger in the eye of one private company after another for two years now.  

Stuxnet: Computer Worm Opens New Era of Warfare
From ACM News

Stuxnet: Computer Worm Opens New Era of Warfare

For the past few months now, the nation's top military, intelligence and law enforcement officials have been warning Congress and the country about a coming cyberattack...

Why the Security Industry Never Actually Makes ­s Secure
From ACM News

Why the Security Industry Never Actually Makes ­s Secure

Every year, security vendors gather at the RSA conference here to reaffirm their commitment to fencing out hackers and keeping data safe. And every year, corporate...

The Little White Box That Can Hack Your Network
From ACM News

The Little White Box That Can Hack Your Network

When Jayson E. Street broke into the branch office of a national bank in May of last year, the branch manager could not have been more helpful.

Here's The Best (and Prettiest) Way To See Exactly How You're Being Tracked Online
From ACM News

Here's The Best (and Prettiest) Way To See Exactly How You're Being Tracked Online

Firefox-browser provider Mozilla has released an awesome new tool for seeing how you're being tracked on the Web.

From ACM News

I'm Being Followed: How Google

This morning, if you opened your browser and went to NYTimes.com, an amazing thing happened in the milliseconds between your click and when the news appeared on...

Et Tu, Google? Android Apps Can Also Secretly Copy Photos
From ACM News

Et Tu, Google? Android Apps Can Also Secretly Copy Photos

It's not just Apple. Photos are vulnerable on Android phones, too.

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says
From ACM News

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says

In the midst of an ongoing turf battle over how big a role the National Security Agency should play in securing the nation’s critical infrastructure, a Defense...

Despite Intrusions, Chances Of U.s.-China Cyberwar Are Small
From ACM News

Despite Intrusions, Chances Of U.s.-China Cyberwar Are Small

A panel of security and policy experts said that, despite dire warnings about the information warfare capabilities of China and other developing nations, the risk...

From ACM News

How a Web Link Can Take Control of Your Phone

A chilling demonstration to a small, packed room at the RSA security conference showed how clicking a single bad Web link while using a phone running Google's Android...

­.s. Wants You to Hunt Fugitives With Twitter
From ACM News

­.s. Wants You to Hunt Fugitives With Twitter

A worldwide manhunt kicks off at the end of March—a search across America and Europe for five fugitives, identifiable only by their mugshots.

In the World of Big Data, Privacy Invasion Is the Business Model
From ACM News

In the World of Big Data, Privacy Invasion Is the Business Model

Recent weeks have seen a lot of (overdue) talk about privacy and technology. There was theflap over Path and other mobile apps uploading your phone's address books...

From ACM News

DARPA Warns: Your Iphone Is a Military Threat

There’s a growing threat to the U.S. military, according to the Pentagon's premier research wing. No, it's not Iran’s nukes or China's missiles. It's the iPads,...

Defense Department Wants More Control Over the Internet
From ACM News

Defense Department Wants More Control Over the Internet

The U.S. Department of Defense may have funded the research that led to the Internet, but freewheeling innovation created the patchwork of privately owned technology...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account