acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


­nderwater Robots Identify Potential Threats in Murky Waters
From ACM News

­nderwater Robots Identify Potential Threats in Murky Waters

Harbor Branch Oceanographic Institute at Florida Atlantic University has received $2 million from the U.S. Department of Defense, Office of Naval Research, to continue...

From ACM TechNews

IBM Claims Privacy Breakthrough For Cloud, Data

A lattice approach could be used to develop fully homomorphic encryption solutions, says IBM researcher Craig Gentry, a Stanford University Ph.D. candidate. Gentry's...

Iranian Protesters Avoid Censorship With Navy Technology
From ACM TechNews

Iranian Protesters Avoid Censorship With Navy Technology

Some Iranian protestors dissatisfied with their government's response to the disputed election are using The Onion Router (TOR), an Internet encryption program...

Community Colleges Mobilize to Train Cybersecurity Workers
From ACM TechNews

Community Colleges Mobilize to Train Cybersecurity Workers

Some experts project that the Obama administration's cybersecurity push will expand two-year colleges' role in supplying cybersecurity workers to government agencies...

From ACM News

­k Looks to Young Geeks to Secure Cyberspace

Britain is hiring former computer hackers to join a new security unit aimed at protecting cyberspace from foreign spies, thieves and terrorists, the country's terrorism...

From ACM TechNews

'secret' Questions Leave Accounts Vulnerable

The secret questions some Web sites ask new users to answer for verification purposes in case a password is forgotten are actually far less secure and far easier...

U.s. Creates Military Command For Cyber Battlefield
From ACM News

U.s. Creates Military Command For Cyber Battlefield

The U.S. military announced a new "cyber command" designed to wage digital warfare and to bolster defenses against mounting threats to its computer networks. Defense...

China Linked to 70 Percent of World's Spam, Expert Says
From ACM News

China Linked to 70 Percent of World's Spam, Expert Says

Nearly three-quarters of the Web sites advertised in computer spam studied by the University of Alabama at Birmingham (UAB) Spam Data Mine so far in 2009 are tied...

From ACM TechNews

­csd Scientists Receive Innovation Research Awards From Hp Labs

University of California, San Diego (UCSD) computer scientists Amin Vahdat and Geoffrey Voelker are two of the 60 professors that will receive awards as part of...

Twitter Message Could Be Cyber Criminal at Work
From ACM News

Twitter Message Could Be Cyber Criminal at Work

Cyber criminals are setting snares that move at the speed of news. Panda Security, a Spain-based antivirus maker, has been monitoring an onslaught of links with...

From ACM TechNews

Futurephile: Knowledge Embedded in Everything

The day will come when everyone will wear glasses with a computer overlay capable of processing the faces of passersby and tell wearers if they have met someone...

From ACM TechNews

Administration Plans to Scale Back Real Id Law

U.S. Secretary of Homeland Security Janet Napolitano is calling on lawmakers to change the Real ID Act to make it more palatable to states. Eleven states have refused...

From ACM TechNews

E-Mail Surveillance Renews Concerns in Congress

A National Security Agency (NSA) operation involving surveillance of American residents' communications, especially domestic email, is fueling debate in the U.S...

Vinton Cerf: Outer Space Could be Next Frontier for Cybersecurity
From ACM TechNews

Vinton Cerf: Outer Space Could be Next Frontier for Cybersecurity

NASA and Google Internet evangelist Vinton Cerf are currently testing an extraterrestrial Internet that could lead to technology for use in securing ad hoc networks...

From ACM News

China Says ­npopular Filtering Software Optional

China appeared to cave in to public pressure Tuesday (June 16) by announcing that computer users are not required to install Internet-filtering software — though...

From ACM TechNews

Secret War on Web Crooks Revealed

Three times a year, leaders from the world's major technology and communications companies meet to discuss strategies for preventing the Internet from becoming...

From ACM News

China's Filtering Software is 'Poorly Designed,' Researchers Say

Anti-pornography software that China will make mandatory next month is "poorly designed" and will make personal computers vulnerable to security breaches, said...

From ACM TechNews

Experts Urge Federal Efforts on Cybersecurity

The U.S. federal government needs to step up its cybersecurity efforts, experts from industry and academia recently told the House Science and Technology Committee's...

Robotic Ferret Will Detect Hidden Drugs and Weapons
From ACM TechNews

Robotic Ferret Will Detect Hidden Drugs and Weapons

Engineering & Physical Sciences Research CouncilScientists at the University of Sheffield have developed the first cargo-scanning device that can operate inside...

From ACM TechNews

The Internet Is Incomplete, Says its Co-Designer, Vinton Cerf

Google Internet evangelist Vinton Cerf, the co-designer of the Internet's TCP/IP protocols along with Robert Kahn, says the Web continues to lack many of the basic...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account