acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Anticensorship Tool Proves Too Good to Be True
From ACM News

Anticensorship Tool Proves Too Good to Be True

Experts warn that the software could identify those it claims to protect.

From ACM News

Darpa Wants You To Build An Anti-Secrecy App

Usually the Pentagon expends time and technological effort to protect information. But now the far-out researchers at Darpa are looking for a few good futurists...

Number of New Computer Viruses at Record High
From ACM News

Number of New Computer Viruses at Record High

Cyber criminals are attracted to enormously popular Internet-based social networks such as Facebook or LinkedIn, and are using such networks to attack Internet...

Can You Find Me Now?
From ACM News

Can You Find Me Now?

By demonstrating fundamental limits on their accuracy, MIT researchers show how to improve wireless location-detection systems.

From ACM News

Crowdsourcing Peer Review

It is the greatest question in computer science. A negative answer would likely give a fundamentally deeper understanding of the nature of computation. And a...

Preventing Smart-Phone Armageddon
From ACM TechNews

Preventing Smart-Phone Armageddon

Attacks against smartphones are likely to proliferate because of their growing ubiquity and the sensitive information they carry. However, researchers believe...

From ACM TechNews

Quantum Cryptography Breached With Lasers

Three universities in Europe collaborated to develop a laser-based attack against quantum cryptography systems that allows them to eavesdrop on communications without...

From ACM News

What Info Can ­ncle Sam Dig ­p About You?

Got any secrets you're hiding from Uncle Sam? The answer had better be no, because in the digital age, your life is more of an open book than ever before.

From ACM TechNews

Botnet Takedown May Yield Valuable Data

Ruhr-University researchers have dismantled part of Pushdo, one of the top five networks of hacked computers responsible for most of the world's spam, which could...

Scientists View Cybersecurity as an Intimidating Conundrum
From ACM TechNews

Scientists View Cybersecurity as an Intimidating Conundrum

The U.S. President's Council of Advisors on Science and Technology recently called on cybersecurity experts to discuss specific areas in the networking and information...

ITU Head: Cyberwar Could Be 'Worse Than Tsunami'
From ACM TechNews

ITU Head: Cyberwar Could Be 'Worse Than Tsunami'

There needs to be a global cybersecurity peace treaty to avert the threat of international cyberwar, whose effects would be more devastating than a tsunami, says...

A Strong Password Isn't the Strongest Security
From ACM News

A Strong Password Isn't the Strongest Security

Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it—never write it down. And, oh yes, change it every few...

From ACM TechNews

Vulnerability in Commercial Quanto Cryptography

Researchers at the Norwegian University of Science and Technology, the University of Erlangen-Nurnberg, and the Max Planck Institute for the Science of Light have...

Hackers Blind Quantum Cryptographers
From ACM News

Hackers Blind Quantum Cryptographers

Lasers crack commercial encryption systems, leaving no trace.

DARPA
From ACM News

DARPA

Tomorrow’s WikiLeakers may have to be sneakier than just dumping military docs onto a Lady Gaga disc. The futurists at Darpa are working on a project that would...

K-Anonymity Privacy Protection Model Needs a Little Help
From ACM News

K-Anonymity Privacy Protection Model Needs a Little Help

The "K-anonymity"  method of providing anonymity to large data sets has raised excitement in realms as diverse as social networks and medical records, but it appears...

Prison Without Walls
From ACM News

Prison Without Walls

Incarceration in America is a failure by almost any measure. But what if the prisons could be turned inside out, with convicts released into society under constant...

From ACM News

The Internet's Secret Back Door

Web users in the United Arab Emirates have more to worry about than having just their BlackBerries cracked.

Retargeting Ads Follow Surfers to Other Sites
From ACM News

Retargeting Ads Follow Surfers to Other Sites

The shoes that Julie Matlin recently saw on Zappos.com were kind of cute, or so she thought. But Ms. Matlin wasn’t ready to buy and left the site. Then the shoes...

From ACM TechNews

Panel: ­.s. Lacks Legal Framework to Fight in Cyberspace

The absence of a legal framework for waging cyberwarfare is crippling the U.S.'s ability to defend itself in cyberspace, according to a panel of government and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account