acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


­.s. Military Expanding Arsenal of Cyber-Warfare Capabilities
From ACM TechNews

­.s. Military Expanding Arsenal of Cyber-Warfare Capabilities

Experts say the U.S. government is fortifying its cyberwarfare capabilities as a defensive measure against enemies. 

New Patriot Act Controversy: Is Washington Collecting Your Cell-Phone Data?
From ACM News

New Patriot Act Controversy: Is Washington Collecting Your Cell-Phone Data?

The U.S. Senate Intelligence Committee is weighing fresh concern about the sweeping nature of domestic spying using one controversial section of the Patriot Act...

From ACM TechNews

Google Builds Developer Tool to Flag Web App Vulnerabilities

Google has released DOM Snitch, an experimental extension for its Chrome browser that enables developers to scan Web applications and flag code that could be exploited...

From ACM News

Post-9/11 Security: A Rational Student Debate

The 10th anniversary of the Sept. 11, 2001, terrorist attacks is approaching, and you can count on the flow of remembrances and where-are-we-now updates swelling...

The Cop on the Cyber Beat
From ACM Opinion

The Cop on the Cyber Beat

Homeland Security's Bruce McConnell on the government's role in helping companies fight online attacks.

­.s. to Provide Guidelines to Bolster Computer Security
From ACM TechNews

­.s. to Provide Guidelines to Bolster Computer Security

The U.S. Department of Homeland Security will release a new system of guidelines intended to increase security in the software in many Web-based services. The...

From ACM News

Protect Your Computer and Phone from Illegal Police Searches

Your computer, your phone, and your other digital devices hold vast amounts of personal information about you and your family. Can police officers enter your...

From ACM News

Tamper-Proof Internet Security System Begins

A small group of Internet security specialists gathered in Singapore last week to start up a global system to make email and e-commerce more secure, end the proliferation...

Cracking the Code of Machine Translation
From ACM TechNews

Cracking the Code of Machine Translation

University of Southern California scientists have developed a machine-translation technique that treats translation as a cryptographic challenge rather than a matter...

Dns Agility Leads to Botnet Detection
From ACM TechNews

Dns Agility Leads to Botnet Detection

The use of tactics to strengthen botnets, such as fast-flux networks and Conficker-like dynamic domain generation, can tip off their activities, according to research...

From ACM TechNews

Planetlab Creates a More Advanced Sudo

A new program from Princeton University stands to give data center administrators far greater control over what end users can and cannot access on a computer. 

Remembering Alan Turing on His 99th Birthday
From ACM News

Remembering Alan Turing on His 99th Birthday

Today marks the 99th anniversary of the birth of Alan Turing, a noted polymath and cryptanalyst who is regarded by many as being the grandfather of modern computing...

Botclouds: A Cyberattacker's Dream
From ACM TechNews

Botclouds: A Cyberattacker's Dream

Delft University researchers are studying how botclouds can be used to launch attacks, send spam, and commit fraud. 

From ACM Opinion

Eff and Bitcoin

For several months, EFF has been following the movement around Bitcoin, an electronic payment system that touts itself as "the first decentralized digital currency...

Free App Protects Facebook Accounts From Hackers
From ACM TechNews

Free App Protects Facebook Accounts From Hackers

University of California, Riverside researchers have developed MyPageKeeper.org, a free Facebook application that detects spam and malware posted on users' walls...

Upending Anonymity, These Days the Web Unmasks Everyone
From ACM News

Upending Anonymity, These Days the Web Unmasks Everyone

Not too long ago, theorists fretted that the Internet was a place where anonymity thrived. Now, it seems, it is the place where anonymity dies.

ACM Award Recipients
From Communications of the ACM

ACM Award Recipients

Craig Gentry, Kurt Mehlhorn, and other computer scientists are honored for their research and service.

Brave, New Social World
From Communications of the ACM

Brave, New Social World

How three different individuals in three different countries — Brazil, Egypt, and Japan — use Facebook, Twitter, and other social-media tools.

From ACM TechNews

Careless Behavior of Cloud ­sers Leads to Crucial Security Threats

Cloud computing security experts often focus on the underlying infrastructure and provider, but a new analysis from Fraunhofer SIT and the System Security Lab at...

Software Extracts Your Location on Twitter Even When It's Secret
From ACM TechNews

Software Extracts Your Location on Twitter Even When It's Secret

Users of online social media reveal more about themselves than they realize, and participation involves a great deal more trust than they think, suggests new research...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account