acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Nist Is Nearly Ready to Pick the Next Hash Algorithm

Developers of the 14 semifinalist algorithms for the new SHA-3 Secure Hash Algorithm standard will defend their work at a U.S. National Institute of Standards and...

From ACM News

Flawed Proof ­shers In Era of Wikimath

His prospects of answering one of the biggest questions in mathematics may be fading, but Vinay Deolalikar of Hewlett-Packard Labs in Palo Alto, California, may...

From ACM News

­.s. Takes Aim at China Cyber Threat

The U.S. for the first time is publicly warning about the Chinese military's use of civilian computer experts in clandestine cyber attacks aimed at American companies...

Intel-McAfee Deal Bets on Building Security Into Hardware
From ACM News

Intel-McAfee Deal Bets on Building Security Into Hardware

Intel Corp. agreed to buy security-software specialist McAfee Inc. Thursday for $7.68 billion, a surprise transaction that underscores the company's determination...

From ACM News

Wikileaks Encryption ­se Offers 'legal Challenge'

A novel use of encryption by whistle-blowing website Wikileaks could "challenge the legal system for years to come," according to an influential observer of the...

What Does 'p vs. Np' Mean For the Rest of Us?
From ACM News

What Does 'p vs. Np' Mean For the Rest of Us?

A proposed "proof" is probably a bust—but even failed attempts can advance computer science.

From ACM News

New Facebook Location Feature Sparks Privacy Concerns

Moments after Facebook introduced a new feature called Facebook Places on Wednesday that allows its users to share their location and find their friends, advocates...

Mobile Flaw Could Cloak Clicks
From ACM TechNews

Mobile Flaw Could Cloak Clicks

Stanford University researchers have found that mobile websites are extremely vulnerable to attacks from malicious sites using a technique known as tapjacking,...

From ACM TechNews

Feds Strengthen Cybersecurity Workforce Plans

Representatives from both the public and the private sector who attended a recent cybersecurity conference said that progress has been made in developing and executing...

Is Sending Signals to Aliens Really a Good Idea?
From ACM News

Is Sending Signals to Aliens Really a Good Idea?

If we are not alone in the universe, then—considering what happened to the Indians after Columbus landed in America—shouldn't we be keeping a pretty low profile...

From ACM News

Step 1: Post Elusive Proof. Step 2: Watch Fireworks.

 The potential of Internet-based collaboration was vividly demonstrated this month when complexity theorists used blogs and wikis to pounce on a claimed proof for...

From ACM TechNews

Smudges on Touchscreen Phones Could Reveal User Passwords

University of Pennsylvania researchers have found that smartphone passwords can be deciphered by analyzing the smudges left on their touchscreens. 

From ACM TechNews

'Science 2.0' Sifts Data to Provide Relevant Search Results

A team at West Virginia University is researching ways to make better use of digital data. The researchers are working on technology that knows a user's goals...

From ACM News

Hiding Files in Flickr Pics Will Fool Web Censors

Life is about to become more difficult for countries trying to censor access to foreign Websites. A system dubbed Collage will allow users in these countries...

Stuxnet Could Hijack Power Plants, Refineries
From ACM News

Stuxnet Could Hijack Power Plants, Refineries

A worm that targets critical infrastructure companies doesn't just steal data, it leaves a back door that could be used to remotely and secretly control plant...

How Spies (and Counter Spies) Are Using The Cloud
From ACM News

How Spies (and Counter Spies) Are Using The Cloud

Secret agents have long been at the cutting edge of technological developments. By studying how different spy agencies use technology, it’s often been possible...

Tire Tags Reveal Driver Whereabouts
From ACM TechNews

Tire Tags Reveal Driver Whereabouts

Researchers at Rutgers University and the University of South Carolina have found that wireless signals between new cars and their tires can be intercepted or forged...

Teraflop Troubles: Powerful Gpus May Threaten the World's Password Security System
From ACM TechNews

Teraflop Troubles: Powerful Gpus May Threaten the World's Password Security System

Georgia Tech Research Institute computer scientists are studying whether desktop computers with graphics processing units are so powerful that they compromise password...

From ACM News

P ? Np? It's Bad News For the Power of Computing

Has the biggest question in computer science been solved? On 6 August, Vinay Deolalikar, a mathematician at Hewlett-Packard Labs in Palo Alto, California, sentdraft...

Google Mapping Worries Spread
From ACM News

Google Mapping Worries Spread

South Korea police raid Internet giant's offices; German officials criticize plan to roll out Street View in 20 cities.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account