acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


China's 'Big Hole' Marks Scale of Supercomputing Race
From ACM News

China's 'Big Hole' Marks Scale of Supercomputing Race

1,000 U.S. scientists are involved in exascale development, but China and Europe have stepped up their investment, IBM warns.

From ACM News

A Silent Attack, but Not a Subtle One

 As in real warfare, even the most carefully aimed weapon in computer warfare leaves collateral damage. The Stuxnet worm was no different.

From ACM News

­.s. Wants to Make It Easier to Wiretap the Internet

 Federal law enforcement and national security officials are preparing to seek sweeping new regulations for the Internet, arguing that their ability to wiretap...

From ACM News

Cyber Attacks Test Pentagon, Allies and Foes

 Cyber espionage has surged against governments and companies around the world in the past year, and cyber attacks have become a staple of conflict among states...

From ACM News

Malware Hits Computerized Industrial Equipment

 The technology industry is being rattled by a quiet and sophisticated malicious software program that has infiltrated factory computers.

From ACM News

Researchers Design Tool to Improve Wikipedia Accuracy

A team of University of Iowa researchers has developed a new tool that detects potential vandalism on Wikipedia and can help improve the accuracy of the online...

From ACM News

An Army of Tech-Savvy Warriors Has Been Fighting Its Battles in Cyberspace

They were Air Force fighter pilots, Army rangers and Marine tank commanders. There was even a Navy fighter jet radar officer who had been taken prisoner during...

Cyberwar Chief Calls For Secure Computer Network
From ACM News

Cyberwar Chief Calls For Secure Computer Network

Gen. Keith B. Alexander,  commander of the U.S. military's cyberwarfare operations, is advocating the creation of a separate, secure computer network to protect...

From ACM News

Seeing the Internet As an 'information Weapon'

The United States and other world powers have agreed to arms control measures in recent years that limit the deployment and use of nuclear, biological and chemical...

Future Online Password Could Be a Map
From ACM TechNews

Future Online Password Could Be a Map

AT&T researcher Bill Cheswick believes maps could serve as passwords for computer users. Cheswick says computer users could memorize a spot on a satellite photo...

Extending the Law of War to Cyberspace
From ACM News

Extending the Law of War to Cyberspace

It may come as a surprise to some war victims, but there actually is a body of international law that establishes when and how nations can legally engage in armed...

From ACM TechNews

New Research Improves Ability to Detect Malware in Cloud-Computing Systems

North Carolina State University researchers have developed HyperSentry, software that offers enhanced security for cloud computing systems.

How Safe Is Your Swipe?
From ACM TechNews

How Safe Is Your Swipe?

Tel Aviv University researchers have developed a method of extracting information from chip technology by combining modern cryptology methods with constraint programming...

Pentagon Bomb Squad Backs Super Snipers, Mini-Bots, Secret Spy Tech
From ACM News

Pentagon Bomb Squad Backs Super Snipers, Mini-Bots, Secret Spy Tech

"Devil Pup" robots. Super sniper scopes. Secret signals intelligence sensors. Flying spies to find buried threats. Campaigns to influence the media behind the...

From ACM News

'Cookies' Cause Bitter Backlash

Spate of lawsuits shows user discomfort with latest innovations in online-tracking technology.

From ACM News

Cloud Computing Hits Snag in Europe

Cloud-based breakthroughs face a formidable obstacle in Europe: strict privacy laws that place rigid limits on the movement of information beyond the borders...

From ACM News

­.s. Cybersecurity Plans Lagging, Critics Say

More than a year after President Obama made a White House speech proclaiming that the protection of computer networks was a national priority, the federal government...

From ACM News

Nist Finalizes Initial Set of Smart Grid Cyber Security Guidelines

NIST has issued its first Guidelines for Smart Grid Cyber Security, and additional information for crafting strategies to protect the modernizing power grid from...

From ACM News

Officials In The Dark About Voting Machine Glitches

Problems with voting machines are still popping up 10 years after the controversial presidential vote in Florida.

From ACM TechNews

Quantum Crypto Products Cracked By Researchers

A European research team has shown that commercial implementations of quantum key distribution (QKD) are subject to eavesdropping with off-the-shelf materials. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account