acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Administration Issues Far-Reaching Plan For Building Cyber Workforce
From ACM TechNews

Administration Issues Far-Reaching Plan For Building Cyber Workforce

The Obama administration has unveiled the first-ever roadmap for building a U.S. cybersecurity workforce and assessing federal success in raising public awareness...

Industry Tries to Streamline Privacy Policies For Mobile ­sers
From ACM TechNews

Industry Tries to Streamline Privacy Policies For Mobile ­sers

As concerns grow over data collection, including proposed legislation to more closely protect consumers, mobile applications developers are building basic privacy...

New Anti-Censorship Scheme Could Make It Impossible to Block Individual Sites
From ACM TechNews

New Anti-Censorship Scheme Could Make It Impossible to Block Individual Sites

Researchers at the universities of Michigan and Waterloo are developing Telex, an approach to combating Internet censorship that turns the entire Web into a proxy...

Human Body Vulnerable to Cyberattack
From ACM TechNews

Human Body Vulnerable to Cyberattack

Security researcher Jay Radcliffe has demonstrated how a hacker could remotely attack medical devices used to treat diabetes. 

Future of War: Private Robot Armies Fight It Out
From ACM News

Future of War: Private Robot Armies Fight It Out

If robots are simply computers with wings (and missiles), then expect to see future wars fought by the descendants of flash-trading algorithms, with humans as...

Ieee to Create Anti-Malware 'packer' Validation System
From ACM TechNews

Ieee to Create Anti-Malware 'packer' Validation System

The IEEE has launched a system for tracing the output of all certified binary packers to verify which license was used to create an executable file. 

From ACM TechNews

Tracking Crime in Real Time

Tel Aviv University researchers are using digital activities to catch criminals and strengthen homeland security efforts against terrorists. 

Defcon Opens Its Doors to Pre-Teen and Teen Hackers
From ACM News

Defcon Opens Its Doors to Pre-Teen and Teen Hackers

DefCon, the conference where hackers and the people who monitor them get together to trade the latest in hacking and tracking data, had some new attendees: children...

Mobilizing Help for People Accused of Hacking
From ACM News

Mobilizing Help for People Accused of Hacking

When Senator Joseph R. McCarthy held hearings in the 1950s to question witnesses about their supposed ties to communism, critics accused him of fomenting a Red...

Researchers Show Off Homemade Spy Drone at Black Hat
From ACM TechNews

Researchers Show Off Homemade Spy Drone at Black Hat

Security researchers Mike Tassey and Richard Perkins recently unveiled the Wi-Fi Aerial Surveillance Platform, a remote controlled unmanned aerial vehicle that...

Why Has BlackBerry Been Blamed for the London Riots?
From ACM News

Why Has BlackBerry Been Blamed for the London Riots?

The whole of London is taking stock after outbreaks of violence and looting across the capital. Ealing, Camden, Peckham, Clapham, Lewisham, Woolwich, and Hackney...

From ACM News

Web Tracking Has Become a Privacy Time Bomb

For more than a decade, tracking systems have been taking note of where you go and what you search for on the Web—without your permission. Today many of the personal...

The Science of Cyber Security
From ACM TechNews

The Science of Cyber Security

The University of California, Berkeley's Team for Research in Ubiquitous Secure Technology (TRUST) is developing cybersecurity science and technology designed...

A Cloud That Can't Leak
From ACM TechNews

A Cloud That Can't Leak

Microsoft researchers have developed a prototype data security system designed to ensure that information can only escape in an encrypted form that would be nearly...

DARPA Funds Hackers to Innovate Military Tech
From ACM TechNews

DARPA Funds Hackers to Innovate Military Tech

The U.S. Defense Advanced Research Projects Agency (DARPA) recently launched Cyber Fast Track, a program that will fund innovative cybersecurity efforts by groups...

From ACM News

Black Hat: Legal Pitfalls of Investigating Mobile

Hackers today are testing mobile devices ever more strenuously, but the work often stands on shaky legal ground, according to Jennifer Granick, an attorney for...

From ACM News

Your Smartphone: A New Frontier For Hackers

Last week, security researchers uncovered yet another strain of malicious software aimed at smartphones that run Google's popular Android operating system. The...

From ACM News

At a Hacker Conference, Plenty of Friendly Feds

 Why are the Feds hobnobbing with hackers? Defcon, a convention of computer hackers here, was crawling with federal agents on Friday. They smiled, shook hands,...

From ACM News

Your Face

Imagine being able to sit down in a bar, snap a few photos of people, and quickly learn who they are, who their friends are, where they live, what kind of music...

European Security Group Issues Warning on HTML5
From ACM TechNews

European Security Group Issues Warning on HTML5

New standards under development as part of HTML5 neglect important security issues, according to a European Network and Information Security Agency (ENISA) report...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account