acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Networked Networks Are Prone to Epic Failure
From ACM News

Networked Networks Are Prone to Epic Failure

Networks that are resilient on their own become fragile and prone to catastrophic failure when connected, suggests a new study with troubling implications for tightly...

Marketers Watch as Friends Interact Online
From ACM News

Marketers Watch as Friends Interact Online

Birds of a feather flock together. Or, in the Internet age, a customer's friend is a potential customer. Embracing those truisms, some big marketers, including...

From ACM News

Entangle Qubits for a True Random Number Machine

Pure randomness is surprisingly difficult to create, even if you draw on the inherent randomness of quantum mechanics. Now, though, a "true" random number generator...

From ACM News

Pentagon Turns to 'softer' Sciences

By highlighting the limits of traditional military technology, the drawn-out conflicts in Iraq and Afghanistan have spurred the U.S. defense department to shake...

From ACM TechNews

Steganography Discovery Could Help Data Thieves, But Also Improve Radar, Sonograms

The technology for instruments used to see through fog also could be used for optical steganography, according to a team of researchers at Princeton University. ...

Keeping Medical Data Private
From ACM News

Keeping Medical Data Private

Researchers at Vanderbilt University have created an algorithm designed to protect the privacy of patients while maintaining researchers' ability to analyze vast...

From ACM TechNews

­ncle Sam Wants You (to Fight Hackers)

A shortfall of cybersecurity professionals is on the horizon, with Boeing's Alan Greenberg warning that the U.S. public and private sectors will collectively need...

'big Data' Can Create Big Issues
From ACM TechNews

'big Data' Can Create Big Issues

Tech firms are approaching the challenge of mining "big data"—immense repositories of information generated by industry and government—by using predictive analytics...

From ACM News

Battling Botnets With An Awesome Os

Two University of Illinois at Chicago computer scientists have won a $1.15 million National Science Foundation grant to develop a new kind of computer operating...

From ACM TechNews

U.s. One Step Closer to Cyber Guards For Nation's Electric Grid

The bidding for a National Electric Sector Cyber Security Organization that would shield the U.S. electrical grid from cyberattacks was officially opened up by...

From ACM TechNews

After Google-China Dust-­p, Cyberwar Emerges as a Threat

Recent cyberattacks against Google and other tech firms highlight concerns about adversaries' ability to launch a full-fledged cyberwar against the United States...

Hackers Not Linked to China's Government, Researcher Says
From ACM News

Hackers Not Linked to China's Government, Researcher Says

China-based hackers who stole data on India's missile systems, private correspondence of the Dalai Lama and Canadian visa applications appear not to be linked...

Glonass: Has Russia's Sat-Nav System Come of Age?
From ACM News

Glonass: Has Russia's Sat-Nav System Come of Age?

With the Glonass satellite-navigation constellation nearly complete, Russia's plan to wean itself off the US Global Positioning System (GPS) appears to be coming...

Combing Medical Records For Research
From ACM News

Combing Medical Records For Research

When the stimulus bill passed last year--allocating $20 billion to help doctors and hospitals adopt electronic medical records (EMRs)--many scientists were excited...

Researchers Trace Data Theft to Intruders in China
From ACM News

Researchers Trace Data Theft to Intruders in China

Canadian and United States computer security researchers have monitored the spying operation of a China-based computer espionage gang for the past eight months...

Speedier Bug Catching
From ACM TechNews

Speedier Bug Catching

Engineers have developed new transistors that can locate hardware bugs in a fraction of the time it takes to perform normal debugging. 

Researchers Sound Alarm on Web App 'side Channel' Data Leaks
From ACM TechNews

Researchers Sound Alarm on Web App 'side Channel' Data Leaks

Researchers who have tested the security of popular online tax, health, investing, and search sites report that the Web applications are becoming more vulnerable...

From ACM TechNews

Security Researchers Hacked Iphone

The University of Luxembourg's Ralf-Philipp Weinmann and Zynamics' Vincenzo Iozzo chained existing code bits  to compromise the iPhone during the PWN2OWN hacking...

Playing It Safe With Two Networks
From ACM News

Playing It Safe With Two Networks

To protect itself from hackers, Cryptography Research runs two unconnected networks—one for sensitive data and core engineering work that is not connected to the...

From ACM TechNews

Cyberattacks Are 'Existential Threat' to U.S., FBI Says

The threat from cyberattacks is so severe that it actually threatens the very existence of the United States, says Steven Chabinsky, the deputy assistant director...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account