acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

The Race to Zero: Speech By Andrew Haldane

In a speech at the International Economic Association 16th World Congress in Beijing, Andrew Haldane, Executive Director for Financial Stability and member of...

Questioning the Inca Paradox
From ACM News

Questioning the Inca Paradox

Did the civilization behind Machu Picchu really fail to develop a written language?

Five Tips To Improve Enterprise Mobile Security
From ACM News

Five Tips To Improve Enterprise Mobile Security

Mobile devices are increasingly connected with an ecosystem of third-party cloud and desktop services outside an enterprise's control. Here's five tips that enterprises...

It Security: Staying Ahead of the Curve
From ACM TechNews

It Security: Staying Ahead of the Curve

The size and scope of cybersecurity needs to account for the integration of information technology into everything, says Robert Brammer with the Northrop Grumman...

From ACM News

Former CIA Director: Build a New Internet to Improve Cybersecurity

The United States may seriously want to consider creating a new Internet infrastructure to reduce the threat of cyberattacks, said Michael Hayden, President George...

From ACM News

Spies Want to Mine Your Tweets For Signs of the Next Tsunami

The intelligence community has seen the future, and the future is Google Trends. Actually, more like a highly sophisticated version of Google Trends, with Twitter...

Can Anyone Create a Hacker-Proof Cyberspace?
From ACM TechNews

Can Anyone Create a Hacker-Proof Cyberspace?

The opportunity for cyberattacks increases every day as corporations and governments continue stockpiling information about individuals in complex networks across...

A Futures Market For Computer Security
From ACM TechNews

A Futures Market For Computer Security

A pilot prediction market that can forecast major information security incidents before they occur is under development by information security researchers from...

Kevin Mitnick Shows How Easy It Is to Hack a Phone
From ACM News

Kevin Mitnick Shows How Easy It Is to Hack a Phone

British tabloid News of the World said it is closing down over a phone hacking scandal in which workers for the Rupert Murdoch-owned newspaper allegedly snooped...

Phone Hacking Can Extend Beyond Voice Mail
From ACM News

Phone Hacking Can Extend Beyond Voice Mail

While the phone hacking by British tabloid News of the World was unexceptional by technical standards, security experts say the scandal portends how the growth...

Should the Government Need a Search Warrant to Track Your Car with Gps?
From ACM News

Should the Government Need a Search Warrant to Track Your Car with Gps?

The Supreme Court ended its term with a high-profile ruling that violent video games are protected by the First Amendment, but a bigger technology decision could...

From ACM News

Maryland Sees Its Moment in Cybersecurity

As Fort Meade increasingly becomes a stronghold for federal cybersecurity, Maryland officials and business advocates are trying to take advantage of what they...

From ACM News

Cisco Poised to Help China Keep an Eye on Its Citizens

Western companies, including Cisco Systems Inc., are poised to help build an ambitious new surveillance project in China—a citywide network of as many as 500,000...

From ACM News

Hackers Select a New Target: Other Hackers

The hackers, calling themselves the A-Team, assembled a trove of private information and put it online for all to see: names, aliases, addresses, phone numbers...

Interview with Key Lulzsec Hacker
From ACM News

Interview with Key Lulzsec Hacker

It was early May when LulzSec's profile skyrocketed after a hack on the giant Sony corporation. LulzSec's name comes from Lulz, a corruption of LOL, often denoting...

Microsoft Researchers Find Spammers By Graphing Social Networks
From ACM TechNews

Microsoft Researchers Find Spammers By Graphing Social Networks

Microsoft researchers are studying how to differentiate spammer email accounts from legitimate users' accounts, and have found that attacker accounts do not have...

From ACM News

Bug-Squashing Tools Offered to Improve Network Security

The Department of Homeland Security has announced an initiative to shore up security by squashing software bugs. This follows a slew of high-profile attacks on...

Robert Morris, Pioneer in Computer Security, Dies at 78
From ACM News

Robert Morris, Pioneer in Computer Security, Dies at 78

Robert Morris, a cryptographer who helped developed the Unix computer operating system, which controls an increasing number of the world's computers and touches...

From ACM News

Massive Botnet 'indestructible,' Say Researchers

A new and improved botnet that has infected more than four million PCs is "practically indestructible," security researchers say. "TDL-4," the name for both the...

From ACM News

Google Takes On Friend Sprawl

Google Inc. launched its most ambitious social-networking effort yet, broadening a battle with Facebook Inc. to grab the attention of Web users and future advertising...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account