acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Business Of Burying Internet Search Results
From ACM News

The Business Of Burying Internet Search Results

Unseen battles are waged every day on the Internet to protect and destroy brands and reputations. The Internet can be a hostile place, with powerful companies paying...

Facebook in Privacy Breach
From ACM News

Facebook in Privacy Breach

Top-ranked applications transmit personal IDs, a Journal investigation finds.

From ACM News

­.s. Companies Are at Risk of Spying By Their Own Workers

Huang Kexue, federal authorities say, is a new kind of spy. For five years, Mr. Huang was a scientist at a Dow Chemical lab in Indiana, studying ways to improve...

'scrapers' Dig Deep For Data on Web
From ACM News

'scrapers' Dig Deep For Data on Web

At 1 a.m. on May 7, the website PatientsLikeMe.com noticed suspicious activity on its "Mood" discussion board. There, people exchange highly personal stories...

Call to Define Rules of Cyber War
From ACM News

Call to Define Rules of Cyber War

Nations need to define the rules of engagement for acts of cyber terror.

Time For ­.s. to Assert Itself on the Internet, Report Says
From ACM TechNews

Time For ­.s. to Assert Itself on the Internet, Report Says

The United States should apply its interests in overseeing the Internet's infrastructure because it plays such a crucial role in the country's national security...

Web Code Offers New Ways To See What ­sers Do Online
From ACM News

Web Code Offers New Ways To See What ­sers Do Online

Worries over Internet privacy have spurred lawsuits, conspiracy theories and consumer anxiety as marketers and others invent new ways to track computer users...

From ACM TechNews

Innovation Mandate: Has America Lost Its Innovation Edge?

There are worries that U.S. high-tech global competitiveness is eroding because, among other things, intellectual property devised by U.S. companies is leaking...

From ACM TechNews

Eu Seeks to Boost Defenses Against Cyber Attacks

The European Commission has made several proposals designed to counter large-scale cyberattacks that could paralyze the computer networks of European Union nations...

Should Code Be Released?
From Communications of the ACM

Should Code Be Released?

Software code can provide important insights into the results of research, but it's up to individual scientists whether their code is released---and many opt not...

Personal Fabrication
From Communications of the ACM

Personal Fabrication

Open source 3D printers could herald the start of a new industrial revolution.

From ACM TechNews

Nsf ­rges Lawmakers to Back ­se of Better Science Data

The U.S. House's Research and Scientific Education Subcommittee recently held a hearing on the National Science Foundation's approach to scientific policy. The...

From ACM News

Internet Pioneers Protest Senate Anti-Piracy Bill

Some of the rock stars of Internet engineering (yes, they exist) on Tuesday protested a Senate bill aimed at fighting online piracy, saying the legislation could...

From ACM News

India Launches Project to Id 1.2 Billion People

India's vaunted tech savvy is being put to the test this week as the country embarks on a daunting mission: assigning a unique 12-digit number to each of its...

­npublished Iraq War Logs Trigger Internal Wikileaks Revolt
From ACM News

­npublished Iraq War Logs Trigger Internal Wikileaks Revolt

A domino chain of resignations at the secret-spilling site WikiLeaks followed a unilateral decision by autocratic founder Julian Assange to schedule an October...

From ACM News

A Silent Attack, but Not a Subtle One

 As in real warfare, even the most carefully aimed weapon in computer warfare leaves collateral damage. The Stuxnet worm was no different.

From ACM News

­.s. Wants to Make It Easier to Wiretap the Internet

 Federal law enforcement and national security officials are preparing to seek sweeping new regulations for the Internet, arguing that their ability to wiretap...

From ACM TechNews

FCC Opens Unused TV Airwaves to Broadband

The U.S. Federal Communications Commission (FCC) has passed a proposal to make vast swaths of idle TV broadcast airwaves available for high-speed wireless broadband...

From ACM News

Software Forensics Tools Enter the Courtroom

As litigation over software in the United States and elsewhere has skyrocketed, automatic software forensics tools that can quickly and accurately uncover illicit...

Extending the Law of War to Cyberspace
From ACM News

Extending the Law of War to Cyberspace

It may come as a surprise to some war victims, but there actually is a body of international law that establishes when and how nations can legally engage in armed...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account