acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future
From ACM News

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future

Ever since Google announced that its Android phones would be equipped with a "digital wallet" that allows users to pay for things simply by touching their phone...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...

From ACM News

Operation Shady RAT May Be the Biggest Hack in History but Is No Surprise

Anybody involved in the IT and cybersecurity industry knows that every major industry and government agency around the world is under threat of intrusion through...

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems
From ACM News

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems

A security researcher has uncovered a slew of vulnerabilities in Siemens industrial control systems, including a hard-coded password, that would let attackers...

From ACM News

Pentagon Seeks a Few Good Social Networkers

The Pentagon is developing plans to use social networking sites like Facebook and Twitter as both a resource and a weapon in future conflicts. Its research and...

Meet Dark Tangent, the Hacker Behind Black Hat and Def Con
From ACM News

Meet Dark Tangent, the Hacker Behind Black Hat and Def Con

The word "hacker" evokes all kinds of scary images. But Jeff Moss says hackers are exactly what the world needs more of, because they can make the Internet safer...

Researchers Expose Cunning Online Tracking Service That Can
From ACM News

Researchers Expose Cunning Online Tracking Service That Can

Researchers at U.C. Berkeley have discovered that some of the net's most popular sites are using a tracking service that can't be evaded—even when users block...

Here's How U.s. Spies Will Find You Through Your Pics
From ACM News

Here's How U.s. Spies Will Find You Through Your Pics

Iarpa, the intelligence community’s way-out research shop, wants to know where you took that vacation picture over the Fourth of July. It wants to know where...

From ACM TechNews

Experts Complacent About Communication Network Attacks

Industry experts could be underestimating the vulnerability of the Internet due to physical attacks to telecommunications infrastructure, according to a recent...

From ACM News

Document: Fbi Surveillance Geeks Fear, Love New Gadgets

Can't wait for 4G to become the ubiquitous standard for mobile communication? On the edge of your seat for the unveiling of Microsoft's secret Menlo Project and...

What Will We Watch As Drones Evolve?
From ACM News

What Will We Watch As Drones Evolve?

Every week it seems there are reports about U.S. drones—unmanned, remote-controlled aerial vehicles—tracking down suspected terrorists in remote, unreachable...

Santa Clara ­niversity Math Scholar Fights Crime with Mad Math Skills
From ACM News

Santa Clara ­niversity Math Scholar Fights Crime with Mad Math Skills

George Mohler is a crime-fighting, math professor superhero—not that he'd ever call himself that.

'Fluid Cloak' to Help Submarines Leave No Wake
From ACM News

'Fluid Cloak' to Help Submarines Leave No Wake

Super-stealthy submarines may one day glide through the water without creating a wake, if a plan to channel fluid intelligently around objects can be made to...

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells
From ACM News

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells

Vulnerabilities in electronic systems that control prison doors could allow hackers or others to spring prisoners from their jail cells, according to researchers...

Expert Hacks Car System, Says Problems Reach to Scada Systems
From ACM News

Expert Hacks Car System, Says Problems Reach to Scada Systems

Researcher Don A. Bailey will be showing at the Black Hat security conference how easy it is to open and even start a car remotely by hacking the cellular network...

From ACM News

Nsa Lawyer Questioned Over Cellphone Location Tracking of Americans

Is the government using cellular data to track Americans as they move around the U.S.? According to the general counsel of the National Security Agency, it may...

Cyber Weapons: The New Arms Race
From ACM TechNews

Cyber Weapons: The New Arms Race

A rash of cyberattacks has raised the profile of such incursions and led to a booming cyberweapons industry. 

Codebook Shows an Encryption Form Dates Back to Telegraphs
From ACM News

Codebook Shows an Encryption Form Dates Back to Telegraphs

If not for a computer scientist’s hobby of collecting old telegraph codebooks, a crucial chapter in modern cryptography might have been lost to history.

From ACM News

Black Hat Pwnie Award Winner Will Be a Criminal

Law enforcement may be interested to see if anyone actually shows up to this year to accept the annual Pwnie Award for Epic Ownage at Black Hat, since all the nominees...

From ACM News

Decoding Your Email Personality

Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account