acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Biometric Identity Project in India Aims to Provide For Poor, End Corruption
From ACM News

Biometric Identity Project in India Aims to Provide For Poor, End Corruption

In this country of 1.2 billion people, Inderjit Chaurasia could not prove his identity. When the migrant worker tried to open his first bank account in New Delhi...

Spies Among Us?
From Communications of the ACM

Spies Among Us?

Governments' practice of electronic surveillance—and the growing use of warrantless wiretapping—has observers deeply concerned.

Robots Gear Up For Disaster Response
From Communications of the ACM

Robots Gear Up For Disaster Response

After 15 years of research, robots for search and rescue may be nearing prime time.

Data Streaming 2.0
From Communications of the ACM

Data Streaming 2.0

In today's real-time Web, data streaming applications no longer have the luxury of making multiple passes over a recorded data set.

Laser Security for the Internet
From ACM TechNews

Laser Security for the Internet

Jacob Scheuer at Tel Aviv University's School of Electrical Engineering has developed an information security system that acts as a type of key bearer. 

Google's Brin Talks About China Gamble
From ACM News

Google's Brin Talks About China Gamble

 Behind Google Inc.'s dramatic decision to shutter its China-based search engine this week was co-founder Sergey Brin's change of heart about the compromises required...

Cyber Attack on U.s. Firms, Google Traced to China
From ACM News

Cyber Attack on U.s. Firms, Google Traced to China

An Obama administration official told The Washington Times the U.S. was able, with some confidence, to link the cyber attack on Google and other U.S. companies...

­.s. Cyber Command Prepped to Launch
From ACM News

­.s. Cyber Command Prepped to Launch

Washingon's new U.S. Cyber Command is prepped and ready but is still waiting for Senate approval of its new commander before it can open for business.

Cyber Warriors
From ACM TechNews

Cyber Warriors

Purdue University's Eugene Spafford says that cybercrime has evolved into a well-financed enterprise perpetrated by mature individuals and groups of professionals...

Academic Paper in China Sets Off Alarms in ­.s.
From ACM News

Academic Paper in China Sets Off Alarms in ­.s.

Wang Jianwei, a graduate engineering student in Liaoning, China, who was described as a potential cyberwarrior before the United States Congress this month, says...

From ACM News

Dismantling of Saudi-CIA Web Site Ilustrates Need For Clearer Cyberwar Policies

By early 2008, top U.S. military officials had become convinced that extremists planning attacks on American forces in Iraq were making use of a Web site set up...

From ACM News

Big Brother at the Movies: Can They Really Do That?

When it comes to portraying Big Brother on the big screen, how close is Hollywood fiction to real-world fact?  Intercepting private cell phone calls. Deploying...

Web Sites That Can Take a Punch
From ACM TechNews

Web Sites That Can Take a Punch

Massachusetts Institute of Technology researchers have developed a system to keep Web servers running even when they are under attack from cybercriminals. 

From ACM News

New Spam Targeting Facebook ­sers Is Invisible to Most Virus Scans, Says Expert

Cyber-criminals are using fake e-mails to target Facebook users and deliver computer viruses that were being detected only by one-third of the 42 most common anti...

Privacy in the Age of Digital Glass Houses
From ACM News

Privacy in the Age of Digital Glass Houses

The private e-mails and texts that keep you closely connected could quickly turn embarrassing if made public by a spurned friend or partner. How much privacy can...

From ACM TechNews

Mobile Phone Allows Boss to Snoop

KDDI Corp. has developed mobile phone technology that detects even the tiniest actions of the user by analyzing the movement of accelerometers embedded in the devices...

How Privacy Vanishes Online
From ACM News

How Privacy Vanishes Online

If a stranger came up to you on the street, would you give him your name, Social Security number and e-mail address? Yet people often dole out all kinds of personal...

From ACM TechNews

Sending Botnets the Way of Smallpox

University of Tulsa researchers have published a legal study on three "technically feasible" compulsory vaccination scenarios that governments could consider to...

Software: Running Commentary For Smarter Surveillance?
From ICT Results

Software: Running Commentary For Smarter Surveillance?

Cutting-edge surveillance software that automatically detects human motion, behaviour and facial expressions, generates a running commentary of what's happening...

Instant Ads Set the Pace on the Web
From ACM News

Instant Ads Set the Pace on the Web

 Advertisers have been able to direct online messages based on demographics, income and even location, but one element has been largely missing until recently:...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account