acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Amassing a Small Army Against a Growing Enemy
From ACM TechNews

Amassing a Small Army Against a Growing Enemy

Boston University researchers have developed software aimed at identifying unwanted Internet traffic, which would enable network providers to stop botnets from...

How High-Frequency Trading Is Changing Wall Street
From ACM News

How High-Frequency Trading Is Changing Wall Street

On May 6, 2010, the Dow Jones industrial average dropped hundreds of points in a matter of minutes—and then recovered moments later.

Senate to Try Again on Controversial Antipiracy Bill
From ACM TechNews

Senate to Try Again on Controversial Antipiracy Bill

The U.S. Senate judiciary committee will renew its effort to pass the Combating Online Infringement and Counterfeits Act this spring, which would give the government...

Breaking Bottlenecks
From ACM News

Breaking Bottlenecks

A new algorithm enables much faster dissemination of information through self-organizing networks with a few scattered choke points.

From ACM TechNews

White House Calls For Internet Identity Ecosystem to Protect Online Users

The Obama administration has announced a plan to establish an Internet identity ecosystem that will lower the incidence of fraud and identity theft while making...

Algorithms Take Control of Wall Street
From ACM News

Algorithms Take Control of Wall Street

Last spring, Dow Jones launched a new service called Lexicon, which sends real-time financial news to professional investors. This in itself is not surprising...

Why Are Health Data Leaking Online? Bad Software, Study Says
From ACM TechNews

Why Are Health Data Leaking Online? Bad Software, Study Says

A recent Dartmouth College study found that sensitive health care data is being leaked online through peer-to-peer (P2P) file-sharing services. In addition, the...

From ACM News

Hackers Find New Way to Cheat on Wall Street

High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts...

From ACM News

The New Speed of Money, Reshaping Markets

A substantial part of all stock trading in the United States takes place in a warehouse in a nondescript business park just off the New Jersey Turnpike.

And Then There Were Five: Nist Names Sha-3 Crypto Competition Finalists
From ACM News

And Then There Were Five: Nist Names Sha-3 Crypto Competition Finalists

Out of the original 64, there now are five candidates left in the ongoing multi-year competition overseen by NIST to create the next 'hash' algorithm to protect...

Car Theft by Antenna
From ACM TechNews

Car Theft by Antenna

A method for breaking into and stealing cars that have keyless entry and starting systems has been found by ETH Zurich researchers, who were able to gain entry...

Network Defense Gone Wrong
From ACM TechNews

Network Defense Gone Wrong

Many companies use content-delivery networks as a defense against distributed denial-of-service (DDoS) attacks, but Michael Rabinovich of Case Western Reserve University...

Utah's $1.5 Billion Cyber-Security Center Under Way
From ACM News

Utah's $1.5 Billion Cyber-Security Center Under Way

Today's groundbreaking for a $1.5 billion National Security Agency data center is being billed as important in the short term for construction jobs and important...

From ACM TechNews

'sms of Death' Could Crash Many Mobile Phones

Low-end mobile phones are vulnerable to hackers using short message service (SMS) communications, according to research presented at a recent conference in Germany...

Nist Publications Recommend Organization-Wide It Security Risk Management
From ACM News

Nist Publications Recommend Organization-Wide It Security Risk Management

Two new draft publications from NIST provide the groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the...

Beyond Surveillance: Darpa Wants a Thinking Camera
From ACM News

Beyond Surveillance: Darpa Wants a Thinking Camera

It’s tough being an imagery analyst for the U.S. military: you’re drowning in pictures and drone video, with more pouring in endlessly from the tons of sensors...

IPv6 Guide for Secure Deployment of Next-Generation Internet Protocol
From ACM News

IPv6 Guide for Secure Deployment of Next-Generation Internet Protocol

Researchers at the National Institute of Standards and Technology have issued a guide for managers, network engineers, transition teams and others to help them...

The American Wikileaks Hacker
From ACM News

The American Wikileaks Hacker

Jacob Appelbaum fights repressive regimes around the world—including his own.

From ACM News

Computers That See You and Keep Watch Over You

Hundreds of correctional officers from prisons across America descended last spring on a shuttered penitentiary in West Virginia for annual training exercises...

From ACM TechNews

Rules of Engagement For Cyberwars See Slow Progress

Rules of cyberwar engagement are lagging behind world powers' development of their cyberwarfare capabilities.  Meanwhile, cyberwarfare funding continues to rise...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account