acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Educating Elite Hackers

It started with Michael Coppola taking things apart at the age of five: the remote control, his mother's house lamps, the family's VCR. He was curious about how...

From ACM TechNews

Developing Web Technologies to Share Secure Information

Semantic Web technology will be a key tool in the development of a standard policy language for sharing information between agencies, countries, and organizations...

Getting More from Location Data
From ACM News

Getting More from Location Data

Thanks to smart phones and other mobile devices, the number of applications that make use of geolocation data is exploding. But developers and device makers face...

From ACM TechNews

The Next Secure Hash Algorithm Had Better Be a Good One

 Katholieke Universiteit Leuven professor Bart Preneel says the SHA-3 hash algorithm selected by the National Institute of Standards and Technology will need to...

Cyberwar Declared as China Hunts for the West's Intelligence Secrets
From ACM News

Cyberwar Declared as China Hunts for the West's Intelligence Secrets

Urgent warnings have been circulated throughout NATO and the European Union for secret intelligence material to be protected from a recent surge in cyberwar attacks...

Security Pros Question Deployment of Smart Meters
From ACM News

Security Pros Question Deployment of Smart Meters

The country’s swift deployment of smart-grid technology has security professionals concerned that utilities and smart-meter vendors are repeating the mistakes made...

White House Cyber Czar: 'there Is No Cyberwar'
From ACM News

White House Cyber Czar: 'there Is No Cyberwar'

Howard Schmidt, the new cybersecurity czar for the Obama Administration, has a short answer for the drumbeat of rhetoric claiming the United States is caught up...

China in Consultations With Google to Resolve Dispute
From ACM News

China in Consultations With Google to Resolve Dispute

China is in consultations with technology giant Google to resolve its dispute with the company, which has threatened to abandon the Chinese market over hacking...

Napolitano Issues Dhs National Cybersecurity Challenge to Security Community
From ACM News

Napolitano Issues Dhs National Cybersecurity Challenge to Security Community

U.S. Department of Homeland Security Secretary Janet Napolitano delivered a keynote address which focused on cybersecurity at the RSA Conference in San Francisco...

Researchers Find Weakness in Common Digital Security System
From ACM News

Researchers Find Weakness in Common Digital Security System

The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer...

From ACM TechNews

U.s. Plan to Make Hacking Harder Revealed

The Obama administration has declassified part of its plan to improve the security of cyberspace in an attempt to cultivate greater collaboration between government...

From ACM TechNews

Attack Unmasks User Behind the Browser

Vienna University of Technology researchers have developed the "deanonymization" attack as a way to reveal the identity of Internet users based on their interactions...

Scientists Strive to Map the Shape-Shifting Net
From ACM News

Scientists Strive to Map the Shape-Shifting Net

In a dimly lit chamber festooned with wires and hidden in one of California’s largest data centers, Tim Pozar is changing the shape of the Internet. He is using...

The Interpreter in the Laptop
From ACM TechNews

The Interpreter in the Laptop

Karlsruhe Institute of Technology scientists will demonstrate a language-to-language translation device at the upcoming CeBIT conference. The device combines automatic...

From ACM News

Guide For Applying Risk Management Framework to Information Systems Released

The final publication of the 93-page Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach (NIST Special...

Ornl Technology May Better Detect Cyber Security Attacks
From ACM News

Ornl Technology May Better Detect Cyber Security Attacks

A system that can more effectively detect possible cyber security attacks within large organizations—including government agencies—is being developed with the assistance...

Security Key to Unlocking Cloud Potential
From ACM News

Security Key to Unlocking Cloud Potential

The issue of security is holding back its full potential of cloud computing. This was the gist of the keynote message presented Tuesday (March 2) by Art Coviello...

From ACM News

Study: Google-China Attack Driven by Amateurs

The computer attack which led Google to threaten leaving China and created a firestorm between Washington and Beijing appears to have been deployed by amateurs,...

Sat-Nav Systems ­nder Growing Threat from 'jammers'
From ACM News

Sat-Nav Systems ­nder Growing Threat from 'jammers'

Technology that depends on satellite-navigation signals is increasingly threatened by attack from widely available equipment, experts say. While "jamming" sat-nav...

Experts Warn of Catastrophe From Cyberattacks
From ACM TechNews

Experts Warn of Catastrophe From Cyberattacks

A panel of experts told U.S. senators at a recent hearing of the Senate Committee on Commerce, Science, and Transportation that the United States would be defeated...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account