acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

'Tamper Evident' CPU Warns of Malicious Backdoors

Columbia University scientists have developed a chip design that prevents microprocessors from being equipped with malicious backdoors that could be used to steal...

From ACM News

Cars' Computer Systems Called at Risk to Hackers

Automobiles, which will be increasingly connected to the Internet in the near future, could be vulnerable to hackers just as computers are now, two teams of computer...

Four Nerds and a Cry to Arms Against Facebook
From ACM News

Four Nerds and a Cry to Arms Against Facebook

How angry is the world at Facebook for devouring every morsel of personal information we are willing to feed it?

Comments Sought on Guide for Assessing Federal IT Security Controls
From ACM News

Comments Sought on Guide for Assessing Federal IT Security Controls

NIST has issued the final draft of its Guide for Assessing Security Controls in Federal Information Systems and Organizations and is seeking public comments.

From ACM TechNews

Improved Online Security for a Tenth of the Cost

Computer scientists in the United Kingdom are developing a system that would offer a high level of security at one-tenth the cost of existing systems using specialized...

The Cybersecurity Boom
From ACM News

The Cybersecurity Boom

When cybersecurity firm Triumfant was founded in late 2002, it developed software meant to assist help desks in managing information technology problems. The company...

Data Analysis System Could Do Double Duty
From ACM TechNews

Data Analysis System Could Do Double Duty

A new system that analyzes behavioral data to identify potential Internet threats, which may also have application in areas such as health-care monitoring, is under...

Are Surveillance Cameras Worth It?
From ACM News

Are Surveillance Cameras Worth It?

In the aftermath of the attempted car bombing in Times Square, the debate surrounding the increasing use of surveillance cameras has once again moved to center...

From ACM News

Army Spy Plane May Have Snooped on Bomber: Report

Investigators were able to track wannabe terrorist Faisal Shahzad through his anonymous, pre-paid cell phone--exactly how, they won’t say. But there was a tantalizing...

How Isps Could Combat Botnets
From ACM News

How Isps Could Combat Botnets

Convincing Internet service providers to pinpoint infected computers on their networks could eliminate the lion's share of zombie computers responsible for churning...

From ACM TechNews

Your Face Is All You'll Need at an Atm

Waweru Mwangi, director of the Institute of Computer Science and Information Technology at Kenya's Jomo Kenyatta University, demonstrated his Basic Intelligent...

Why Are Computer ­sers Still Choking on Spam?
From ACM News

Why Are Computer ­sers Still Choking on Spam?

Who is actually responsible for sending spam. It might surprise many to learn that the number one source of spam is the United States, according to a new report...

Eu Security Agency Backs Cloud Computing Research
From ACM TechNews

Eu Security Agency Backs Cloud Computing Research

A report from European Union security agency Enisa says that cloud computing, wireless networks, and supply chain integrity should be the focus of information technology...

Shoppers Who Can
From ACM News

Shoppers Who Can

It’s called behavioral tracking: Cameras that can follow you from the minute you enter a store to the moment you hit the checkout counter, recording every T-shirt...

The Legal Case For Robot War Gets Complicated
From ACM News

The Legal Case For Robot War Gets Complicated

The legal debate over America's undeclared drone war in Pakistan is getting sharper: In a congressional hearing yesterday, a prominent law professor suggested that...

­.s. Needs New National Strategy in Era of Cyberaggression, Paper Concludes
From ACM TechNews

­.s. Needs New National Strategy in Era of Cyberaggression, Paper Concludes

The United States must take a more offensive stance to protect itself from cyberaggression, according to a new paper by University of Cincinnati researchers Richard...

From ACM TechNews

Commerce Department Scrutinizes Internet Privacy

The U.S. Commerce Department and various government agencies are creating an Internet Policy Task Force to examine policy frameworks and ways in which the "challenges...

Cash, Check or Charge? How About Cellphone?
From ACM News

Cash, Check or Charge? How About Cellphone?

You win a bet, but the loser does not have enough cash on him to settle it. If he has a credit card, and most people usually do, there is finally a solution. AeBay...

From ACM TechNews

New Research Offers Security For Virtualization, Cloud Computing

North Carolina State University researchers have developed HyperSafe, software for resolving security concerns related to data privacy in virtualization and cloud...

From ACM News

Web Security Attack 'makes Silicon Chips More Reliable'

An attack on a widely used web security system could soon help make silicon chips more powerful and reliable.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account