acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Hardware, Software Advances Help Protect Operating Systems From Attack

North Carolina State University researchers have developed a system that utilizes hardware and software to restore an operating system if it is attacked. The focus...

From Communications of the ACM

ACM Fellows Honored

Forty-one men and women are inducted as 2010 ACM Fellows.

Following the Crowd
From Communications of the ACM

Following the Crowd

Crowdsourcing is based on a simple but powerful concept: Virtually anyone has the potential to plug in valuable information.

Maurice Wilkes: The Last Pioneer
From Communications of the ACM

Maurice Wilkes: The Last Pioneer

Computer science has lost not only a great scientist, but an important link to the electronic computing revolution that took place in the 1940s.

Information Theory After Shannon
From Communications of the ACM

Information Theory After Shannon

Purdue University's Science of Information Center seeks new principles to answer the question 'What is information?'

Chipping Away at Greenhouse Gases
From Communications of the ACM

Chipping Away at Greenhouse Gases

Power-saving processor algorithms have the potential to create significant energy and cost savings.

Headless Conficker Worm Lives in Computers
From ACM TechNews

Headless Conficker Worm Lives in Computers

The people who control the Conficker computer worm have been prevented from using it to control computers and create a botnet, according to a new report. However...

From ACM News

Egypt's Internet Goes Dark During Political ­nrest

Egypt has gone offline.

Dealing With Assange and the Secrets He Spilled
From ACM News

Dealing With Assange and the Secrets He Spilled

This past June, Alan Rusbridger, the editor of The Guardian, phoned me and asked, mysteriously, whether I had any idea how to arrange a secure communication....

From ACM News

Domestic ­se of Aerial Drones By Law Enforcement Likely to Prompt Privacy Debate

The suspect's house, just west of this city, sat on a hilltop at the end of a steep, exposed driveway. Agents with the Texas Department of Public Safety believed...

From ACM News

Qualified Success Claimed Against Computer Worm

Cybersecurity experts combating the Conficker worm claimed qualified success but said millions of computers world-wide were still infected by the malicious software...

Securing the Cloud
From ACM TechNews

Securing the Cloud

University of Texas at Austin researchers are working on the NEBULA project, a U.S. National Science Foundation-funded study to develop a more cloud-compatible...

From ACM TechNews

Giving Hackers a Printed Invitation

At the Shmoocon conference, researchers demonstrated how hackers are using printers to infiltrate corporate computer networks. Printers are "totally integrated...

From ACM News

The End of Credit Cards Is Coming

Credit cards may soon be as outdated as vinyl records. (Remember them?) And this is the year that the slow, steady march to oblivion begins.

Researchers Turn Usb Cable Into Attack Tool
From ACM TechNews

Researchers Turn Usb Cable Into Attack Tool

George Mason University researchers were scheduled to demonstrate a computer device attack using a USB cable at the Black Hat DC conference. 

From ACM TechNews

Administration Says It Will Give Industry and Academia Heads Up on Cyberattacks

Universities and businesses will be supplied with government intelligence about malicious Internet activities by the Obama administration so that they can defend...

From ACM News

Iran Seeks to Boost Corps of Web Watchers

Iran's top police chief envisions a new beat for his forces: patrolling cyberspace.

In New Military, Data Overload Can Be Deadly
From ACM News

In New Military, Data Overload Can Be Deadly

When military investigators looked into an attack by American helicopters last February that left 23 Afghan civilians dead, they found that the operator of a ...

Israel Tests on Worm Called Crucial in Iran Nuclear Delay
From ACM News

Israel Tests on Worm Called Crucial in Iran Nuclear Delay

The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel’s never-acknowledged nuclear arms program, where neat rows of factories...

From ACM TechNews

International Cybersecurity Treaty Might Not Be Achievable, Report Says

An international pact to establish cybersecurity regulations may be unworkable, according to an EastWest Institute report. "Many states are not ready for [a global...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account