acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Smart Cctv Learns to Spot Suspicious Types
From ACM TechNews

Smart Cctv Learns to Spot Suspicious Types

An international team of computer scientists at Queen Mary, University of London are developing intelligent video-surveillance software designed to spot suspicious...

From ACM News

22 Stories ­nderground: Iron Mountain's Experimental Room 48

Down a road that winds through the rolling hills of western Pennsylvania, just across from a cow pasture, the bucolic scenery of Butler County is interrupted by...

Scientists Promise an End to Web Attacks
From ACM TechNews

Scientists Promise an End to Web Attacks

Research on new encryption technology that has the potential to make cyberattacks "computationally impossible" will be presented at the ASIACRYPT 2009 security...

Naval Academy to Emphasize Cybersecurity
From ACM News

Naval Academy to Emphasize Cybersecurity

Looking at the next great threat to the nation, U.S. Naval Academy officials told the institution's oversight board Monday (December 7) that they plan to make cybersecurity...

Californians and Cell Phones to Help Computer Scientists Track Air Pollution
From ACM News

Californians and Cell Phones to Help Computer Scientists Track Air Pollution

Computer scientists at University of California, San Diego are creating a network of environmental sensors that will help identify air pollution hot spots. The...

From ACM News

Squeezing Web Sites Onto Cellphones

When a group of engineers at National Instruments Corp. modified a 1988 Oldsmobile so it could be controlled by an iPhone, the company was quick to share the project...

Research Group to Tackle Cybersecurity
From ACM TechNews

Research Group to Tackle Cybersecurity

Carnegie Mellon University, the Massachusetts Institute of Technology, Purdue University, and Northrop Grumman have launched a five-year research effort to tackle...

Building Real Security With Virtual Worlds
From ACM TechNews

Building Real Security With Virtual Worlds

University of Maryland (UM) researchers are combining computerized modeling and group behavior predictions with video-game graphics to create virtual worlds that...

From ACM TechNews

Proper ­se of English Could Get a Virus Past Security

Johns Hopkins University security researcher Josh Mason says hackers could potentially evade most existing antivirus programs by hiding malicious code within ordinary...

From ACM TechNews

­niversity ­nites Industry, Gov to Tighten Energy Sector Cybersecurity

A Rice University program created to engage the energy industry and government about protecting power plants from cyberattacks hosted Dale Meyerrose, former CIO...

Ready For a Web OS?
From Communications of the ACM

Ready For a Web OS?

The hegemony of the traditional desktop operating system is starting to fracture with the emergence of a new generation of Web browsers that may finally herald...

From ACM News

Google Offers Peek at Operating System, a Potential Challenge to Windows

MOUNTAIN VIEW, Calif. — Google began lifting the veil on its planned Chrome operating system on Thursday, but it said that computers powered by the software would...

Self-Policing Cloud Computing
From ACM TechNews

Self-Policing Cloud Computing

Researchers at IBM Thomas J. Watson Research Center and IBM Research-Zurich have developed a cloud computing security system that makes elements of the cloud act...

Are Nations Paying Criminals for Botnet Attacks?
From ACM TechNews

Are Nations Paying Criminals for Botnet Attacks?

Countries that want to disrupt other nations' government, banking, and media resources can simply hire cybercriminals to launch botnet attacks, according to new...

Trust Linux!
From ICT Results

Trust Linux!

A team of researchers has implemented support for 'trusted computing' in a commercially available version of the open source operating system Linux, breaking new...

Certification and Accreditation Process For Federal Systems Transformed
From ACM News

Certification and Accreditation Process For Federal Systems Transformed

A revised draft publication on computer security guidance issued by the National Institute of Standards and Technology (NIST) is focused on transforming the episodic...

Mobile Botnets Show Their Destructive Potential
From ACM News

Mobile Botnets Show Their Destructive Potential

Denial-of-services (DoS) attacks are a common tactic used by "black hats" intent on bringing down a high-profile Web site. Now Patrick Traynor of the Georgia Institute...

From ACM News

Researchers Develop Anti-Counterfeiting Technology For Rfid Tags

Engineering researchers at the University of Arkansas have developed a unique and robust method to prevent cloning of passive radio frequency identification (RFID)...

Facebook Offers Poor Personal Data Protection
From ACM TechNews

Facebook Offers Poor Personal Data Protection

A study of Norwegian Internet users and social media found that people are willing to post their personal information on social media sites even when they are not...

Georgia Tech Launches Experimental Green It Initiative
From ACM News

Georgia Tech Launches Experimental Green It Initiative

The biggest challenge in computing today, some experts say, is not processing power, but power consumption. To help understand and reduce power consumption, the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account