acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Arrests of Alleged Spies Draws Attention to Steganography
From ACM News

Arrests of Alleged Spies Draws Attention to Steganography

A year ago in April, the government says, the accused operative known as Richard Murphy and his supposed wife, "Cynthia Murphy," booted up a computer in their comfy...

With World Watching, Wikileaks Falls Into Disrepair
From ACM News

With World Watching, Wikileaks Falls Into Disrepair

Would-be whistle-blowers hoping to leak documents to Wikileaks face a potentially frustrating surprise. Wikileaks’ submission process, which had been degraded for...

Nanoscale Random Number Circuit to Secure Future Chips
From ACM TechNews

Nanoscale Random Number Circuit to Secure Future Chips

Intel engineers have created computer processors with circuits capable of random behavior, a development that could lead to secure cryptography keys.

From ACM News

Police Push to Continue Warrantless Cell Tracking

A law requiring police to obtain a search warrant before tracking Americans' cell phones may imperil criminal investigations and endanger children's lives, a law...

China Pushing the Envelope on Science, and Sometimes Ethics
From ACM News

China Pushing the Envelope on Science, and Sometimes Ethics

Last year, Zhao Bowen was part of a team that cracked the genetic code of the cucumber. These days, he's probing the genetic basis for human IQ.

From ACM News

Beyond the Petaflop: DARPA Wants Quintillion-Speed Computers

Not known for taking the demure route, researchers at DARPA this week announced a program aimed at building computers that exceed current peta-scale computers to...

From ACM News

Nist to Lead Nice Cybersecurity Program

NIST has been tapped to coordinate the new interagency program, which aims to promote cybersecurity awareness and know-how across the country and among citizens...

From ACM News

Nsa Gets Geeky After Dark, New Docs Show

It's an agency staffed by some of the government's top hackers, brainiest cryptographers, and most sophisticated network defenders. But when employees at the NSA...

Visions of the Future
From Communications of the ACM

Visions of the Future

ACM joined forces with the British Computer Society to deliver its first academic research conference in Europe.

Eric Brewer: Change Agent
From Communications of the ACM

Eric Brewer: Change Agent

Eric Brewer's latest project involves designing and deploying low-cost wireless infrastructure in developing regions.

Committed to Success
From Communications of the ACM

Committed to Success

Charles P. Thacker talks about the importance of simplicity, reusable tools, thinking broadly, and his practice of Tom Sawyering.

Censored!
From Communications of the ACM

Censored!

Countries use Internet censorship to dominate the political dialogue, but also to create favorable conditions for government-controlled businesses.

Sharing Computational Perspectives
From Communications of the ACM

Sharing Computational Perspectives

Computer scientists are now making intellectual contributions to a wide range of other disciplines, including evolutionary theory, physics, and economics.

From ACM News

Hackers Aren't Only Threat to Privacy

Sophisticated hackers aren't the only ones gaining access to sensitive data on the Internet. A large amount of personal information is being left exposed or poorly...

From ACM News

Wanted: Young Cyberexperts to Defend Internet

The federal government, education officials and giant military contractors are collaborating to recruit a new class of tech professional specifically trained...

From ACM TechNews

Why Can't Johnny Develop Secure Software?

Despite a wealth of security knowledge and developers' access to advanced tools, many software security risks remain. Analysts say that many software developers...

From ACM News

Kaminsky Issues Developer Tool To Kill Injection Bugs

Renowned security researcher Dan Kaminsky today went public with the launch of a new venture as well as its first deliverable--a tool for application developers...

Cyber-War a Growing Threat Warn Experts
From ACM News

Cyber-War a Growing Threat Warn Experts

In 2007, Estonia was the subject of a series of cyber attacks which crippled the Internet across the country. Banks, government departments and the national media...

10 R&d Cybersecurity Initiatives Congress Seeks
From ACM TechNews

10 R&d Cybersecurity Initiatives Congress Seeks

The Protecting Cyberspace as a National Asset Act of 2010, which was recently introduced in the U.S. Senate, lists 10 R&D initiatives the government would support...

From ACM TechNews

Get Smart: Targeting Phone Security Flaws

Data from the National Vulnerability Database shows that last year security experts identified 30 security flaws in the software and operating systems of smartphones...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account