acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


New Hacking Tools Pose Bigger Threats to Wi-Fi ­sers
From ACM News

New Hacking Tools Pose Bigger Threats to Wi-Fi ­sers

You may think the only people capable of snooping on your Internet activity are government intelligence agents or possibly a talented teenage hacker holed up...

From ACM News

Government Employs Hackers in Brave New Scheme

Since the dawn of computing there's been a cold war between those who run computer systems and those who attack them. And never the twain shall meet—at least...

From ACM News

Iran's Natanz Nuclear Facility Recovered Quickly from Stuxnet Cyberattack

In an underground chamber near the Iranian city of Natanz, a network of surveillance cameras offers the outside world a rare glimpse into Iran's largest nuclear...

Stuxnet Virus Targets and Spread Revealed
From ACM News

Stuxnet Virus Targets and Spread Revealed

A powerful internet worm repeatedly targeted five industrial facilities in Iran over 10 months, ongoing analysis by security researchers shows.

A Father Knows Best: Vint Cerf Re-Thinks the Internet in Stanford Talk
From ACM TechNews

A Father Knows Best: Vint Cerf Re-Thinks the Internet in Stanford Talk

Google's  Vint Cerf, who helped develop the Internet in the 1970s, recently discussed the need to rethink the Internet to handle the growing demand of smartphones...

The Cyberweapon That Could Take Down the Internet
From ACM TechNews

The Cyberweapon That Could Take Down the Internet

University of Minnesota researchers have developed a cyberweapon that turns the structure of the Internet against itself, but ultimately could be used to make the...

 Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant
From ACM News

Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant

Attackers behind the Stuxnet computer worm focused on targeting five organizations in Iran that they believed would get them to their final target in that country...

­.s. Has Secret Tools to Force Internet on Dictators
From ACM News

­.s. Has Secret Tools to Force Internet on Dictators

When Hosni Mubarak shut down Egypt’s internet and cellphone communications, it seemed that all U.S. officials could do was ask him politely to change his mind...

Billboards Join Wired Age
From ACM News

Billboards Join Wired Age

Billboards and posters are one of world's oldest forms of advertising. Now, some marketers and start-ups say wireless technology could revamp outdoor advertising...

Nypd Planning to Use Facial-Recognition Technology to Match Mug Shots to Suspect Videos
From ACM News

Nypd Planning to Use Facial-Recognition Technology to Match Mug Shots to Suspect Videos

The NYPD is about to start using digital technology to match video images of people at crime scenes to mug shots on file, police sources said.

Google Executive Emerges as Key Figure in Revolt
From ACM News

Google Executive Emerges as Key Figure in Revolt

More than a week after his mysterious disappearance in Egypt, Google executive and political activist Wael Ghonim will be released from government detention on...

Proposal for Cyber War Rules of Engagement
From ACM News

Proposal for Cyber War Rules of Engagement

The world needs cyber war "Rules of Engagement" to cope with potentially devastating cyber weapons, Russian and US experts will tell world leaders at a security...

From ACM News

NIST Issues Final Version of Full Virtualization Security Guidelines

NIST has issued the final version of its recommendations for securely configuring and using full computing virtualization technologies.

DHS to Invest $40 Million on Cybersecurity Research
From ACM TechNews

DHS to Invest $40 Million on Cybersecurity Research

The U.S. Department of Homeland Security will invest $40 million on cybersecurity research areas in fiscal 2011 in support of the Comprehensive National Cyber Initiative...

From ACM TechNews

National Competition Puts High Schoolers to the Cyber Warrior Test

Cyber Foundations is a cybersecurity competition for high school students launched by the U.S. Cyber Challenge and the SANS Institute. The contest will help identify...

From ACM News

Was Egypt Oversold as Top Offshoring Spot?

Before Egypt turned off the Internet, the country had received increasingly high marks from leading analysis firms as a promising offshore outsourcing destination...

Report: Efforts to Secure Nation
From ACM News

Report: Efforts to Secure Nation

The official government cybersecurity standards for the electric power grid fall far short of even the most basic security standards observed by noncritical industries...

From ACM News

Wary of Egypt ­nrest, China Censors Web

In another era, China’s leaders might have been content to let discussion of the protests in Egypt float around among private citizens, then fizzle out.

From ACM TechNews

Intel Developing Security 'game-Changer'

Intel researchers are developing computer security technology that stop all zero-day attacks. "We're going to see a quantum jump in the ability of future devices...

From ACM TechNews

European Project Keeps Personal Details Private

The European Union recently launched the ABC4Trust project, which will use encryption technology developed by IBM Research, academic institutions, Microsoft, and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account