acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Domain-Name Abuse Proliferates; Rogue Registrars Turn a Blind Eye

Domain name abuse continues to be a serious problem, which is too often proliferated by some registrars who are willing to overlook phony registration information...

Chinese Schools Quietly Discard Controversial Web Filter
From ACM News

Chinese Schools Quietly Discard Controversial Web Filter

Schools in Beijing are quietly removing the Green Dam filter, which was required for all school computers in July, due to complaints over problems with the software...

On the Road to Secure Car-to-Car Communications
From ICT Results

On the Road to Secure Car-to-Car Communications

A European research project works out how to keep car-to-car data transmissions private and secure from malicious hackers.

Stimulus Funds to Further Cyber Security Research
From ACM TechNews

Stimulus Funds to Further Cyber Security Research

The American Recovery and Reinvestment Act of 2009 will fund a project designed to protect the privacy and security of business information systems and data centers...

Machines Still Way Behind Humans in Image Recognition
From ACM News

Machines Still Way Behind Humans in Image Recognition

Computers can copy many aspects of human behavior, but they don't yet possess our ability to recognize distorted images, says a team of researchers. "Our goal is...

Still Trying to Crack Nazi Enigma Messages
From ACM TechNews

Still Trying to Crack Nazi Enigma Messages

Enigma@home is attempting to break one of three original messages generated by the Enigma machine, which was intercepted by the Allies in 1942. The Enigma M4 machine...

From ACM TechNews

Dhs Report: It Sector Is Resilient Against Serious Cyberattacks

The U.S. Department of Homeland Security recently released a report that outlines several scenarios in which attacks against vital elements of the U.S.'s IT infrastructure...

Open Source Dna
From ACM TechNews

Open Source Dna

Tel Aviv University professor Eran Halperin and researchers from the University of California, Berkeley have developed a mathematical formula that can be used to...

From ACM TechNews

Filtering Network Attacks With a 'netflix' Method

University of California, Irvine (UC Irvine) researchers have developed a new method for blacklisting spam, distributed denial-of-service attacks, worms, and other...

Lawmakers Strike New Tone With Proposed Cybersecurity Bill
From ACM TechNews

Lawmakers Strike New Tone With Proposed Cybersecurity Bill

The second draft of a U.S. Senate cybersecurity bill scales back language that would give the president the ability to shut down the Internet in an emergency....

From ACM News

Budget, Personnel Cutbacks Could Be a Cause of It Outages

When eBay Inc.'s PayPal unit suffered a worldwide outage early last month, Sailrite Enterprises Inc., a sailing supply company based in Churubusco, Ind., lost its...

Dhs Cybersecurity Chiefs Speak Out
From ACM TechNews

Dhs Cybersecurity Chiefs Speak Out

As federal agencies continue to brainstorm ways to effectively oversee cybersecurity, the U.S. Department of Homeland Security (DHS) is increasing its foothold...

Nsf Funds CM­ Interdisciplinary Doctoral Program in Privacy and Security
From ACM TechNews

Nsf Funds CM­ Interdisciplinary Doctoral Program in Privacy and Security

Carnegie Mellon University has received a five-year, $3 million grant from the National Science Foundation to launch a Ph.D. program in usable privacy and security...

From ACM News

Defying Experts, Rogue Computer Code Still Lurks

Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...

Online Social Networks Leak Personal Information to Third-Party Tracking Sites
From ACM TechNews

Online Social Networks Leak Personal Information to Third-Party Tracking Sites

A Worcester Polytechnic Institute (WPI) study by professor Craig Wills found that the practices of many popular social networking sites can make personal information...

Worldwide Battle Rages For Control of the Internet
From ACM TechNews

Worldwide Battle Rages For Control of the Internet

Governments in the Middle East and north Africa routinely block and censor Web sites to control political discussions, according to a new report on the region by...

Computer Science Meets Environmental Science
From Communications of the ACM

Computer Science Meets Environmental Science

Scientists share knowledge and seek collaborators at computational sustainability conference.

Facing an Age-Old Problem
From Communications of the ACM

Facing an Age-Old Problem

Researchers are addressing the computing challenges of older individuals, whose needs are different — and too often disregarded.

Medical Nanobots
From Communications of the ACM

Medical Nanobots

Researchers working in medical nanorobotics are creating technologies that could lead to novel health-care applications, such as new ways of accessing areas of...

Entering a Parallel Universe
From Communications of the ACM

Entering a Parallel Universe

The promise of parallel computing has run afoul of the harsh reality of Amdahl's Law, which puts a ceiling on the benefit of converting sequential code to parallel...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account