acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Stopping Stealthy Downloads

SRI International and Georgia Tech researchers have developed Block All Drive-By Download Exploits (BLADE), free software that can stop Internet attacks brought...

Tracking Garbage
From Communications of the ACM

Tracking Garbage

Researchers are focusing on the so-called "removal chain" in an attempt to save landfill space, improve recycling rates, and trim the flow of toxic materials into...

Engineering the Web's Third Decade
From Communications of the ACM

Engineering the Web's Third Decade

As Web technologies move beyond two-way interactive capabilities to facilitate more dynamic and pervasive experiences, the Web is quickly advancing toward its third...

CS and Biology's Growing Pains
From Communications of the ACM

CS and Biology's Growing Pains

Biologists can benefit from learning and using the tools of computer science, but several real-world obstacles remain.

In Networks We Trust
From ICT Results

In Networks We Trust

European researchers are proposing a paradigm-shifting solution to trusted computing that offers better security and authentication with none of the drawbacks that...

Computer Scientist To Address Congress on Privacy Issues and Location-Based Services
From ACM News

Computer Scientist To Address Congress on Privacy Issues and Location-Based Services

Carnegie Mellon University's Lorrie F. Cranor will discuss the risk and benefits of online services that collect and use location information to joint meetings...

Truly Random Numbers
From ACM TechNews

Truly Random Numbers

German researchers have developed a random number generator that uses a computer memory element, a flip-flop, to create an extra layer of randomness. 

Battling Zombies, Botnets and Torpig
From ACM TechNews

Battling Zombies, Botnets and Torpig

University of Calgary (UC) researchers are developing a range of technologies to prevent and detect cyberattacks and botnets. "It's an issue of scale," says UC...

­sb Fingerprints Identify 'pod Slurping' Data Thieves
From ACM TechNews

­sb Fingerprints Identify 'pod Slurping' Data Thieves

Intellectual property thieves who engage in so-called pod-slurping attacks leave a "USB fingerprint," according to Vasilios Katos and Theodoros Kavallaris of the...

What ­tilities Have Learned From Smart-Meter Tests...
From ACM News

What ­tilities Have Learned From Smart-Meter Tests...

Utilities have learned a lot about how smart meters can compel consumers to save electricity. Unfortunately, too often they aren't putting the knowledge to good...

Searching For Saddam
From ACM News

Searching For Saddam

Traffic had slowed to a crawl in Baghdad's Azamiyah district as drivers stopped to ogle the president. It was April 2003, and Saddam Hussein cheerily greeted his...

From ACM News

Internet Making Our Brains Different, Not Dumb

A decade from now, Google won't make us "stupid," the Internet may make us more literate in a different kind of way, and efforts to protect individual anonymity...

Cashing in on Internet Censorship
From ACM News

Cashing in on Internet Censorship

A growing number of software companies are capitalizing on an unexpected business opportunity: Internet censorship.  In countries where governments continue to...

From ACM News

Cellphone Traces Reveal You're So Predictable

We may all like to consider ourselves free spirits. But a study of the traces left by 50,000 cellphone users over three months has conclusively proved otherwise...

From ACM News

Ex-Army Man Cracks Popular Security Chip

Hardware hacker Christopher Tarnovsky just wanted to break Microsoft's grip on peripherals for its Xbox 360 game console. In the process, he cracked one of the...

Two Chinese Schools Said to Be Tied to Online Attacks
From ACM News

Two Chinese Schools Said to Be Tied to Online Attacks

A series of online attacks on Google and dozens of other American corporations have been traced to computers at two educational institutions in China, including...

From ACM News

Los Alamos, Sandia Plan Cyber Warfare Training

Cyber-security first responders will be put to the test in an upcoming training-and-competition event hosted by Los Alamos and Sandia national laboratories. Federal...

From ACM News

Typos May Earn Google $500m a Year

Google may be earning $500 million a year via companies and individuals who register deceptive Web site addresses. The claim centers on a controversial scheme known...

From ACM News

More Than 75,000 Systems Hacked in Cyber Attacks, Security Firm Says

More than 75,000 computer systems at nearly 2,500 companies in the United States and around the world have been hacked in what appears to be one of the largest...

From ACM TechNews

War Game Reveals ­.s. Lacks Cyber-Crisis Skills

The Bipartisan Policy Center recently staged the Cyber ShockWave, a simulation to demonstrate the plausibility of a cyberattack that could be as crippling as the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account