acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

­.s. Companies Are at Risk of Spying By Their Own Workers

Huang Kexue, federal authorities say, is a new kind of spy. For five years, Mr. Huang was a scientist at a Dow Chemical lab in Indiana, studying ways to improve...

From ACM News

Hackers Turn Attention to Corporate Data Theft

Financial services and professional services are the most vulnerable to information theft, with four out of 10 companies reporting some sort of loss or attack...

From ACM TechNews

Progress Is Slow on Cybersecurity Goals, Gao Reports

The White House's failure to designate roles and responsibilities to federal agencies has impeded efforts to carry out President Obama's strategy for securing computer...

Malware Aimed at Social Networks May Steal Your Reality
From ACM TechNews

Malware Aimed at Social Networks May Steal Your Reality

A research paper predicts a new generation of malware that will target and extract information about relationships and record patterns of behavior in real-world...

From ACM News

Cyberwars Already ­nderway, With No Geneva Conventions

Cyber attacks of various sorts have been around for decades. University at Buffalo military ethicist Randall R. Dipert says we have good reason to worry, because...

'scrapers' Dig Deep For Data on Web
From ACM News

'scrapers' Dig Deep For Data on Web

At 1 a.m. on May 7, the website PatientsLikeMe.com noticed suspicious activity on its "Mood" discussion board. There, people exchange highly personal stories...

Call to Define Rules of Cyber War
From ACM News

Call to Define Rules of Cyber War

Nations need to define the rules of engagement for acts of cyber terror.

Microsoft Fixes Record 49 Holes, Including Stuxnet Flaw
From ACM News

Microsoft Fixes Record 49 Holes, Including Stuxnet Flaw

In a record Patch Tuesday, Microsoft released updates today for Windows, Internet Explorer, and the .NET framework that feature fixes for 49 holes, including...

Time For ­.s. to Assert Itself on the Internet, Report Says
From ACM TechNews

Time For ­.s. to Assert Itself on the Internet, Report Says

The United States should apply its interests in overseeing the Internet's infrastructure because it plays such a crucial role in the country's national security...

Web Code Offers New Ways To See What ­sers Do Online
From ACM News

Web Code Offers New Ways To See What ­sers Do Online

Worries over Internet privacy have spurred lawsuits, conspiracy theories and consumer anxiety as marketers and others invent new ways to track computer users...

From ACM News

Eu Calls Stuxnet 'paradigm Shift' As U.s. Responds More Mildly

While official U.S. response has been comparatively mild, the European Union's cybersecurity agency says Stuxnet represents a "paradigm shift" in critical infrastructure...

From ACM News

Ban Naughty Countries From the Net: Former Intelligence Chief

Countries in Eastern Europe and Africa that harbor cyber criminals should be locked out of the global Internet until their governments do something to reduce...

Sick PCs Should Be Banned From the Net Says Microsoft
From ACM TechNews

Sick PCs Should Be Banned From the Net Says Microsoft

Microsoft researcher Scott Charney recently presented an Internet security proposal that requires users to present a "health certificate" to prove that their PCs...

From ACM News

Georgia Tech Releases Cyber Threats Forecast for 2011

The Georgia Tech Information Security Center (GTISC) has released the GTISC Emerging Cyber Threats Report for 2011, outlining the top three areas of security risk...

From ACM TechNews

Mit Researchers Tout Network Intrusion Recovery System

Massachusetts Institute of Technology researchers are developing RETRO, a system designed to make it easier for organizations to recover from security breaches. ...

From ACM News

Iran Denies Malware Connection to Nuclear Delay

Iranian officials announced Monday that a "small leak" was the cause of the latest setback to starting up its first nuclear power plant, and said the delay had...

From ACM News

Blade Software Eliminates 'drive-By Downloads' from Malicious Websites

Researchers have developed a new tool that eliminates so-called 'drive-by download' threats. BLADE is browser-independent and when tested, it blocked all drive-by...

Power Hackers: The U.s. Smart Grid Is Shaping Up to Be Dangerously Insecure
From ACM News

Power Hackers: The U.s. Smart Grid Is Shaping Up to Be Dangerously Insecure

Achieving greater efficiency and control of the electricity grid requires hooking almost every aspect of it up to the Internet, making it more vulnerable to cyber...

From ACM News

Digital 'fingerprints' to Stop Phone Phishing Scams

Phishing scams are making the leap from email to the world's voice systems, and a team of researchers in the Georgia Tech College of Computing has found a way to...

Stuxnet: Fact vs. Theory
From ACM News

Stuxnet: Fact vs. Theory

The Stuxnet worm has taken the computer security world by storm, inspiring talk of  a government-sponsored cyberwar, and of a software program laden with obscure...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account