acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Report Reveals Critical Infrastructure ­nder Constant Cyber Attack
From ACM News

Report Reveals Critical Infrastructure ­nder Constant Cyber Attack

The staggering cost and impact of cyber attacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and transportation...

To Beat Spam, Turn Its Own Weapons Against It
From ACM TechNews

To Beat Spam, Turn Its Own Weapons Against It

Researchers from the International Computer Science Institute and the University of California, San Diego have developed a method for blocking the most common type...

From ACM News

U.s. Businesses Face Increasing Threats From Chinese Cyber Attacks

U.S. businesses and government agencies are facing increasing risks of potential cyber attacks from China, according to a recent report. And IT departments that...

From ACM News

Pentagon Searches For

One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying...

In Digital Combat, U.s. Finds No Easy Deterrent
From ACM News

In Digital Combat, U.s. Finds No Easy Deterrent

On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the...

Software to Test Cybersecurity Systems For Flaws
From ACM News

Software to Test Cybersecurity Systems For Flaws

Cybersecurity systems are tough to crack, but not tough enough. A Clarkson University professor is developing software programs that will test cybersecurity systems...

From Communications of the ACM

ACM Fellows Honored

Forty-seven men and women are inducted as 2009 ACM Fellows.

Type Theory Comes of Age
From Communications of the ACM

Type Theory Comes of Age

Type systems are moving beyond the realm of data structure and into more complex domains like security and networking.

Security Technique Protects Multi-Party Computation
From ACM News

Security Technique Protects Multi-Party Computation

Recent academic research is advancing the development of secure multi-party computation (SMC), an security technique aimed at protecting data for various online...

From ACM News

Grid Computing and the Future of Cloud Computing

In the late 1990s and early 2000s, the idea of grid computing, a type of distributed computing that harnesses the power of many computers to handle large computational...

From ACM News

Industry Says Gov't Must Regulate 'cloud' to Protect User Privacy

The federal government needs to address electronic security to calm Americans' uncertainty about cloud computing and secure its privacy, according to industry representatives...

From ACM News

If Your Password Is 123456, Just Make It Hackme

Back at the dawn of the Web, the most popular account password was “12345.” Today, it’s one digit longer but hardly safer: “123456.” Despite all the reports...

Security Experts Poke Theoretical Holes in 3g Encryption
From ACM TechNews

Security Experts Poke Theoretical Holes in 3g Encryption

Weizmann Institute of Science researchers recently created a theoretical attack capable of breaking the encryption protocol that is planned for use on 3G telephony...

Cybersecurity Expert Stays Creative Baking Bread
From ACM News

Cybersecurity Expert Stays Creative Baking Bread

Is there a recipe a scientist might follow to spur creativity and cook up new discoveries? Cyber security expert Kevin Fu of the University of Massachusetts Amherst...

From ACM News

Google Patents Mapreduce

Google has received a patent for the technique known as MapReduce. The patent, number 7,650,331, applied for in 2004, is entitled "System and method for efficient...

From ACM News

Fearing Hackers Who Leave No Trace

The crown jewels of Google, Cisco Systems or any other technology company are the millions of lines of programming instructions, known as source code, that make...

Scammers Target Givers After Haiti Earthquake
From ACM News

Scammers Target Givers After Haiti Earthquake

The earthquake in Haiti has motivated many people to make contributions to help. "Unfortunately, these events also bring out the con artists and scammers who are...

From ACM News

Today's Threat: Computer Network Terrorism

"A fleet of fighter planes is not necessary to attack a power station; a keyboard is sufficient. And if you don't have the skills, there are enough mercenary hackers...

From ACM News

Darpa: U.s. Geek Shortage Is National Security Risk

Sure, we’re all plugged in and online 24/7. But fewer American kids are growing up to be bona fide computer geeks. And that poses a serious security risk for the...

From ACM TechNews

Cryptographic Showdown, Round 2: NIST Picks 14 Hash Algorithms

The U.S. National Institute of Standards and Technology (NIST) has completed round one of its open competition to create a new Secure Hash Algorithm (SHA). The...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account