acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


China Internet Hijack: A Guide
From ACM News

China Internet Hijack: A Guide

Cyber terrorism is a growing threat, and of increasing concern to governments around the world. But just what did the latest alleged cyber attack by a Chinese...

From ACM TechNews

In Search of More Than a Few Good Geeks

The U.S. Department of Homeland Security's cybersecurity division has multiplied its employees by six in the past two years, but the agency is still understaffed...

From ACM TechNews

Forcing Browsers to ­se Encryption

The Internet Engineering Task Force has developed a security mechanism to mitigate the threat from browser add-ons that allow attackers to easily capture the cookies...

­.s. Accuses China Telecom of Internet Hijack
From ACM News

­.s. Accuses China Telecom of Internet Hijack

China Telecom diverted Internet traffic from the United States and other nations for about 18 minutes on April 8 by publishing incorrect routing information that...

Cameras to Catch Terrorists Triple in New York With Bomb Plots
From ACM News

Cameras to Catch Terrorists Triple in New York With Bomb Plots

New York City is almost halfway to its goal of installing 3,000 cameras as part of a network to monitor signs of terrorism, about triple the number it had in...

European Cyber Defenses 'Must Improve,' Tests Show
From ACM TechNews

European Cyber Defenses 'Must Improve,' Tests Show

European Union (EU) member states need to do more to prepare for cyberattacks, concludes a report of Cyber Europe 2010, a simulation of how EU countries would react...

From ACM News

Nsa: Our Development Methods Are in the Open Now

Despite its reputation for secrecy, the U.S. National Security Agency doesn't have a set of secret practices that make its applications and systems bulletproof...

From ACM News

Nsa: Our Development Methods Are in the Open Now

Despite its reputation for secrecy and technical expertise, the National Security Agency doesn't have a set of secret coding practices or testing methods that...

From ACM News

New Class of Malware Attacks Specific Chips

Computer scientists reveal malware that attacks specific processors rather than the operating system that runs on them.

Stage Set For Showdown on Online Privacy
From ACM TechNews

Stage Set For Showdown on Online Privacy

The U.S. Federal Trade Commission (FTC) and Commerce Department are planning to release separate and possibly conflicting reports regarding online privacy. Commerce...

Cyber Storm Drill to Yield New Lessons, Feds Say
From ACM TechNews

Cyber Storm Drill to Yield New Lessons, Feds Say

The U.S. Department of Homeland Security recently concluded a cyberwar simulation that connected thousands of participants from the state, federal, and private...

Speed Camera Checks Your Insurance, Tax, Even Whether You're Tailgating
From ACM News

Speed Camera Checks Your Insurance, Tax, Even Whether You're Tailgating

Even the most law-abiding driver might feel a shiver down the spine when spotting this speed camera at the roadside.

Watch Where You're Going
From ACM News

Watch Where You're Going

Businesses are quietly buying mobile-phone data to discover the paths that consumers take.

New Ways Bankers Are Spying on You
From ACM News

New Ways Bankers Are Spying on You

Big Banker is watching you—more closely than ever.

Neighborhood Mischief Caught on Tape
From ACM News

Neighborhood Mischief Caught on Tape

Steve Miller is justifiably proud of the manicured grounds around his stately stucco home in Palm Beach Gardens, Fla. So he was nonplussed last year when he discovered...

Study Finds Support For Presidential Net 'kill Switch'
From ACM TechNews

Study Finds Support For Presidential Net 'kill Switch'

Sixty-one percent of U.S. citizens believe the president should be authorized to control or even shut down portions of the Internet in the event key U.S. systems...

Software to Combat Hacking Technique Wins Award
From ACM News

Software to Combat Hacking Technique Wins Award

One of the serious threats to a user's computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone's identity...

Should We Be Worried About a Cyberwar?
From ACM News

Should We Be Worried About a Cyberwar?

Some experts say that the real danger lies in confusing cyber espionage with cyber war.

Dhs ­rged to Bolster Cyber Infrastructure Security
From ACM TechNews

Dhs ­rged to Bolster Cyber Infrastructure Security

A new U.S. Government Accountability Office report says the Department of Homeland Security is not doing enough to ensure that critical infrastructure such as power...

From ACM News

Amid Criticism, Wikileaks Shifts Focus

When WikiLeaks launched with little fanfare in early 2007, its founders touted it as a unique collaboration that would rely on the same anyone-can-edit software...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account