acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

List of Cyber-Weapons Developed By Pentagon to Streamline Computer Warfare

The Pentagon has developed a list of cyber-weapons and -tools, including viruses that can sabotage an adversary’s critical networks, to streamline how the United...

U.k. Seeks Cyber Security Champions
From ACM News

U.k. Seeks Cyber Security Champions

Britons who can defend the nation's networks armed only with a keyboard are being sought in a national competition.

From ACM News

Pentagon to Consider Cyberattacks Acts of War

The Pentagon, trying to create a formal strategy to deter cyberattacks on the United States, plans to issue a new strategy soon declaring that a computer attack...

Encrypted Voip Not as Secure as It Sounds
From ACM TechNews

Encrypted Voip Not as Secure as It Sounds

Skype and other services that offer voice conversations over the Internet are vulnerable to eavesdropping even though they use both encoding and encryption, according...

From ACM News

Cyber Combat: Act of War

The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for...

Stuxnet Attack Forced Britain to Rethink the Cyber War
From ACM News

Stuxnet Attack Forced Britain to Rethink the Cyber War

The pieces of the puzzle began to take shape, and then fall into place, on 17 June last year, when Sergey Ulasen was emailed by a dealer in Tehran about an irritating...

What Bitcoin Is, and Why It Matters
From ACM News

What Bitcoin Is, and Why It Matters

Recent weeks have been exciting for a relatively new kind of currency speculator. In just three weeks, the total value of a unique new digital currency called...

Code-Cracking Machine Returned to Life
From ACM News

Code-Cracking Machine Returned to Life

The National Museum of Computing has finished restoring a Tunny machine—a key part of Allied code-cracking during World War II.

From ACM TechNews

­.s. International Cyberspace Policy Sounds Good; Will Be Hard to Implement

Although ambitious, the White House's recently issued International Strategy for Cyberspace could be difficult to deploy as some of its objectives conflict and...

All the News That's Fit For You
From Communications of the ACM

All the News That's Fit For You

Personalized news promises to make daily journalism profitable again, but technical and cultural obstacles have slowed the industry's adoption of automated personalization...

Unlimited Possibilities
From Communications of the ACM

Unlimited Possibilities

M. Frans Kaashoek discusses systems work, "undo computing," and what he learned from Andrew S. Tanenbaum.

The Promise of Flexible Displays
From Communications of the ACM

The Promise of Flexible Displays

New screen materials could lead to portable devices that are anything but rectangular, flat, and unbendable.

Biology-Inspired Networking
From Communications of the ACM

Biology-Inspired Networking

Researchers have developed a new networking algorithm, modeled after the neurological development of the fruit fly, to help distributed networks self-organize more...

Homemade Cyberweapon Worries Federal Officials
From ACM TechNews

Homemade Cyberweapon Worries Federal Officials

Security researchers Dillon Beresford and Brian Meixell recently developed a cyberweapon similar to the Stuxnet computer worm that disrupted Iran's nuclear program...

FBI Set to Kill Secret-Stealing Russian 'Botnet.' Is Your Computer Infected?
From ACM TechNews

FBI Set to Kill Secret-Stealing Russian 'Botnet.' Is Your Computer Infected?

The U.S. Federal Bureau of Investigation has seized control of a Russian botnet that commandeered millions of personal computers that may have penetrated U.S. diplomatic...

Researchers Show Android Devices Susceptible to Eavesdropping
From ACM TechNews

Researchers Show Android Devices Susceptible to Eavesdropping

Researchers have found that they can use commercially available software to eavesdrop on Android systems that use authTokens which enable legitimate users to stay...

From ACM News

Autocratic Regimes Fight Web-Savvy Opponents with Their Own Tools

For weeks, Syrian democracy activists have used Facebook and Twitter to promote a wave of bold demonstrations. Now, the Syrian government and its supporters are...

How Spam Works, from End to End
From ACM News

How Spam Works, from End to End

"Click Trajectories: End-to-End Analysis of the Spam Value Chain" is a scholarly research paper reporting on a well-designed study of the way that spam works,...

Tracking How Mobile Apps Track You
From ACM News

Tracking How Mobile Apps Track You

Third-party apps are the weakest link in user privacy on smart phones. They often get access to large quantities of user data, and there are few rules covering...

The Next Big Thing in Analytics: Tracking Your Cursor's Every Move
From ACM News

The Next Big Thing in Analytics: Tracking Your Cursor's Every Move

Media, search engines, advertisers and social networks have been tracking what you click since the birth of the Web, but this measurement yields an incomplete...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account