acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How Credit Card Data Is Stolen and Sold
From ACM News

How Credit Card Data Is Stolen and Sold

Last week, after the Sony PlayStation Network was attacked by a group of unknown hackers, Sony's 77 million customers, along with security specialists and government...

Sohaib Athar on Twitter Fame After Bin Laden Raid (q&a)
From ACM Opinion

Sohaib Athar on Twitter Fame After Bin Laden Raid (q&a)

As U.S. special forces assaulted Osama bin Laden's walled compound in Pakistan, a Twitter user was already recording a rough outline of the events to come.  Sohaib...

Failure Cascading Through the Cloud
From ACM News

Failure Cascading Through the Cloud

Two major cloud computing services, Amazon's Elastic Compute Cloud and Sony's PlayStation Network, recently suffered extended outages. Though the circumstances...

From ACM News

What to Expect from Bin Laden's Hard Drives

The Navy SEALs who raided Osama bin Laden's hideout Sunday tapped into the "mother lode of intelligence," according to a U.S. official speaking to Politico. It...

Wikileaks Founder Julian Assange Rails Against Facebook, Says It's a Spy Tool For ­.s. Government
From ACM News

Wikileaks Founder Julian Assange Rails Against Facebook, Says It's a Spy Tool For ­.s. Government

WikiLeaks founder Julian Assange called Facebook "the most appalling spying machine ever invented" in an interview with Russia Today, pointing to the popular social...

Autonomous Computers to Recognize and Thwart Cyberthreats
From ACM News

Autonomous Computers to Recognize and Thwart Cyberthreats

Bruce McConnell, senior counselor for cybersecurity at the U.S. Department of Homeland Security, suggests that computers should be involved in protecting themselves...

Csi Bin Laden: Commandos Use Thumb, Eye Scans to Track Terrorists
From ACM News

Csi Bin Laden: Commandos Use Thumb, Eye Scans to Track Terrorists

The U.S. forces that killed Osama bin Laden in his Abbottabad compound were more than expert marksmen. Some of them were forensics experts as well, using sophisticated...

How Do They Know He Was Bin Laden?
From ACM News

How Do They Know He Was Bin Laden?

Details about the daring U.S. raid on the fortified compound that led to the death of Osama bin Laden are still scarce. But it's already clear the mission was...

Bin Laden's Villa Lacked Internet, Phone Service
From ACM News

Bin Laden's Villa Lacked Internet, Phone Service

The absence of Internet and telephone service at Osama bin Laden's $1 million hiding place helped tip off intelligence experts that the Al Qaeda leader was indeed...

App-Specific Processors to Fight Dark Silicon
From ACM TechNews

App-Specific Processors to Fight Dark Silicon

University of California, San Diego researchers working on the GreenDroid project have developed software that scans the Android operating system and its most popular...

Jobs and Apple Execs on Tracking Down the Facts About Iphones and Location
From ACM Opinion

Jobs and Apple Execs on Tracking Down the Facts About Iphones and Location

Although Apple was silent for several days after researchers raised issues about location information being stored on the iPhone, that wasn’t because it was ignoring...

The Really Smart Phone
From ACM News

The Really Smart Phone

Researchers are harvesting a wealth of intimate detail from our cellphone data, uncovering the hidden patterns of our social lives, travels, risk of disease—even...

From ACM News

Iran Target of New Cyber Attack

Iran has been targeted by a new computer worm named Stars, the director of Iran's Passive Defense Organization announces.

Indie Truckers: Keep Big Brother Out Of My Cab
From ACM News

Indie Truckers: Keep Big Brother Out Of My Cab

Terry Button is a fifth-generation farmer from upstate New York who also works as a long-distance trucker, hauling hay and produce up and down the East Coast.

Cybersecurity System Mimics Human Immune Response
From ACM TechNews

Cybersecurity System Mimics Human Immune Response

The U.S. Department of Homeland Security's Bruce McConnell recently released a white paper about a healthy ecosystem of computers  that can automatically recognize...

Car Computer Controls Could Be Vulnerable to Hackers
From ACM News

Car Computer Controls Could Be Vulnerable to Hackers

Researchers claim to wirelessly break into automobile networks to take control of brakes and steering as the automobile industry shores up defenses.

Michigan Police Use Device to Download Cellphone Data; Aclu Objects
From ACM News

Michigan Police Use Device to Download Cellphone Data; Aclu Objects

A high-tech gadget that can quickly download information from a cellphone is at the center of a controversy that's pitting civil liberties advocates against state...

How People Broadcast Their Locations Without Meaning To
From ACM News

How People Broadcast Their Locations Without Meaning To

Smartphones include geotagging features many people aren't aware of.

Web Science Meets Network Science
From Communications of the ACM

Web Science Meets Network Science

A pair of divergent scientific communities discusses their similarities and differences, and search for common ground.

Deus Ex Machina
From Communications of the ACM

Deus Ex Machina

Computational metaphysics is helping philosophers answer age-old questions, such as whether God exists.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account