acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Study Sees Way to Win Spam Fight
From ACM TechNews

Study Sees Way to Win Spam Fight

University of California, San Diego researchers recently completed a study aimed at finding a choke point that could reduce the flow of spam emails. 

Crazy Military Tracking Tech, From Super Scents to Quantum Dots
From ACM News

Crazy Military Tracking Tech, From Super Scents to Quantum Dots

Scents that make you trackable, indoors and out. Nanocrystals that stick to your body, and light up on night-vision goggles. Miniradar that maps your location...

Sony Ceo Warns of 'bad New World'
From ACM News

Sony Ceo Warns of 'bad New World'

After spending weeks to resolve a massive Internet security breach, Sony Corp. Chief Executive Howard Stringer said he can't guarantee the security of the company's...

Obama Administration Outlines International Strategy For Cyberspace
From ACM TechNews

Obama Administration Outlines International Strategy For Cyberspace

President Obama has released an international strategy for cyberspace security that focuses on developing rules for responsible state behavior with the goal of...

From ACM News

Why You Can't Really Anonymize Your Data

One of the joys of the last few years has been the flood of real-world data sets being released by all sorts of organizations. These usually involve some record...

Andy Rubin: Why Android Is Only Quasi-Open
From ACM News

Andy Rubin: Why Android Is Only Quasi-Open

Android is open-source software, but it doesn't come with much of an open-source community, and the Google leader of the project explained why.

Why Gadget Makers Wield a 'Kill Switch'
From ACM News

Why Gadget Makers Wield a 'Kill Switch'

When you buy a video game from Best Buy, you don't give the retailer the right to barge into your house whenever it wants. So why do we give that permission to...

From ACM News

Sec Is Pressed on Firms' Disclosures of Cyberattacks

A group of U.S. lawmakers wants the Securities and Exchange Commission to push companies to disclose when they have fallen victim to cyberattacks.

Ralph Langner on Stuxnet, Copycat Threats
From ACM News

Ralph Langner on Stuxnet, Copycat Threats

A year ago, Ralph Langner was plugging away in relative obscurity, doing security consulting work for the industrial control system industry in his Hamburg headquarters...

How Bin Laden Emailed Without Being Detected By U.s.
From ACM News

How Bin Laden Emailed Without Being Detected By U.s.

Using intermediaries and inexpensive computer disks, Osama bin Laden managed to send emails while in hiding, without leaving a digital fingerprint for U.S. eavesdroppers...

Seven Questions For Prith Banerjee, Hewlett-Packard's Head of Research
From ACM News

Seven Questions For Prith Banerjee, Hewlett-Packard's Head of Research

It's been about two months since Hewlett-Packard’s new CEO Léo Apotheker put the company on a new cloud-centric path as part of a big speech laying out a new strategy...

Technology vs. Terrorists
From ACM News

Technology vs. Terrorists

Advanced technologies, including stealth helicopters, helmet-mounted video cameras, and sophisticated data analysis, are helping find terrorists like Osama bin...

Hide Files Within Files For Better Data Security
From ACM TechNews

Hide Files Within Files For Better Data Security

Indian researchers have targeted executable files for use in stenanography because that can vary enormously in size and are usually difficult to examine because...

From ACM News

Domestic Surveillance Court Approved All 1,506 Warrant Applications in 2010

The secretive Foreign Intelligence Surveillance Court approved all 1,506 government requests to electronically monitor suspected "agents" of a foreign power or...

From ACM News

Parting with Privacy with a Quick Click

When Scott Fitzsimones turned 13, he got an iPhone, set up accounts for Facebook and Pandora and went on an apps downloading spree. At the same time, the new...

Bin Laden's Computers Will Test U.s. Forensics
From ACM News

Bin Laden's Computers Will Test U.s. Forensics

For the U.S. government, the raid on Osama bin Laden's compound in Pakistan represents a unique opportunity to test advanced computer forensics techniques called...

From ACM News

Darpa Apes Nick Fury to Map Social Networks

If the military is going to disrupt insurgent cells or understand how revolutionary movements congeal, it needs to perceive the connections between people that...

Customers Had More Faith in Sony Than It Deserved
From ACM News

Customers Had More Faith in Sony Than It Deserved

In the wake of the recent hacking attacks, which compromised more than 100 million account records on its PlayStation Network and Sony Online Entertainment services...

Exploring the Future With Modern Information Technology
From ACM TechNews

Exploring the Future With Modern Information Technology

The goal of the FuturICT global knowledge accelerator platform proposed by European researchers is to understand how the world works so that imminent crises can...

From ACM News

Best Practices For Keeping Your Home Network Secure

The cyber threat is no longer limited to your office network and work persona.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account