acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

With Anonymous and Lulzsec, Is Anyone Believable?

For several months, hackers have been having a heyday taking down Web sites and leaking data from compromised servers with victims ranging from the CIA and U.S...

From ACM News

Spies Can Send Messages Hidden in a Google Search

The peculiar list of search options that Google suggests as you type in a query could be hijacked to let people communicate secretly.

Microsoft Declares Webgl 'harmful' to Security
From ACM TechNews

Microsoft Declares Webgl 'harmful' to Security

Some researchers say that WebGL, a universal three-dimensional Web graphics standard that has been widely anticipated by Web programmers, could lead to significant...

Pentagon's Advanced Research Arm Tackles Cyberspace
From ACM TechNews

Pentagon's Advanced Research Arm Tackles Cyberspace

The U.S. Defense Advanced Research Projects Agency is developing the National Cyber Range, a model of the Internet that will enable researchers to test defense...

Gender-Spotting Tool Could Have Rumbled Fake Blogger
From ACM TechNews

Gender-Spotting Tool Could Have Rumbled Fake Blogger

A gender analysis program developed by Stevens Institute of Technology researcher Na Cheng could have determined the sex of a 40-year-old U.S. man writing online...

How Much Spam Does Your Company ­nknowingly Send?
From ACM News

How Much Spam Does Your Company ­nknowingly Send?

SpamRankings.net uses "name and shame" to publicize organizations that are infected by spam bots.

From ACM News

Legislation Criminalizing Creation of Computer Viruses Enacted

Japan's parliament enacted legislation Friday criminalizing the creation or distribution of computer viruses to crack down on the growing problem of cybercrimes...

Firms Adjust to Hacks
From ACM News

Firms Adjust to Hacks

When email-marketing firm Epsilon Data Management discovered in March that hackers had stolen consumer email addresses it maintains for major banks and retailers...

From ACM News

Full-Field Implementation of a Perfect Eavesdropper on a Quantum Cryptography System

Quantum key distribution allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality...

Ibm's New Future: Quantum Computing
From ACM TechNews

Ibm's New Future: Quantum Computing

Over the next 20 years, the potential of quantum computing could lead to a development boom in chip and hardware design similar to what Silicon Valley experienced...

From ACM News

All Your Bitcoins Are Ours

Malware authors move fast. Following on from the previous blog post on Bitcoin botnet mining, we have seen a recent Trojan in the wild targeting Bitcoin wallets...

Computer Security: Is This the Start of Cyberwarfare?
From ACM TechNews

Computer Security: Is This the Start of Cyberwarfare?

The emergence of the Stuxnet worm signals that groups or nations could launch a cyberattack that targets critical infrastructure and threatens to cause physical...

Protecting Medical Implants from Attack
From ACM News

Protecting Medical Implants from Attack

Millions of Americans have implantable medical devices, from pacemakers and defibrillators to brain stimulators and drug pumps; worldwide, 300,000 more people...

From ACM News

Government in Cyber Fight but Can't Keep Up

The Pentagon is about to roll out an expanded effort to safeguard its contractors from hackers and is building a virtual firing range in cyberspace to test new...

Kissinger, Huntsman: ­.s., China Need Cyber Detente
From ACM TechNews

Kissinger, Huntsman: ­.s., China Need Cyber Detente

The United States and China need to forge an agreement restricting cyberattacks and designating some areas as out of bounds to hacking, say former U.S. Secretary...

F.b.i. Agents Get Leeway to Push Privacy Bounds
From ACM News

F.b.i. Agents Get Leeway to Push Privacy Bounds

The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household...

Bitcoin: The Hacker Currency That's Taking Over the Web
From ACM News

Bitcoin: The Hacker Currency That's Taking Over the Web

Global, private and untraceable, it's the monetary system of choice for libertarians, geeks, businesspeople, and, apparently, drug kingpins.

From ACM TechNews

Making Quantum Cryptography Truly Secure

An overlooked loophole in quantum key distribution technology was demonstrated by an eavesdropping method created and operated by researchers at the National University...

From ACM News

Who Is Behind the Hacks?

Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...

Thieves Found Citigroup Site an Easy Entry
From ACM News

Thieves Found Citigroup Site an Easy Entry

Think of it as a mansion with a high-tech security system—but the front door wasn’t locked tight.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account