acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Stuxnet: Computer Worm Opens New Era of Warfare
From ACM News

Stuxnet: Computer Worm Opens New Era of Warfare

For the past few months now, the nation's top military, intelligence and law enforcement officials have been warning Congress and the country about a coming cyberattack...

Number 1 on Army's Shopping List: Wireless Broadband
From ACM News

Number 1 on Army's Shopping List: Wireless Broadband

The most important element of the Army's effort to modernize itself doesn't shoot. You can't ride in it. You can't wear it for protection against homemade bombs...

Why the Security Industry Never Actually Makes ­s Secure
From ACM News

Why the Security Industry Never Actually Makes ­s Secure

Every year, security vendors gather at the RSA conference here to reaffirm their commitment to fencing out hackers and keeping data safe. And every year, corporate...

The Little White Box That Can Hack Your Network
From ACM News

The Little White Box That Can Hack Your Network

When Jayson E. Street broke into the branch office of a national bank in May of last year, the branch manager could not have been more helpful.

Here's The Best (and Prettiest) Way To See Exactly How You're Being Tracked Online
From ACM News

Here's The Best (and Prettiest) Way To See Exactly How You're Being Tracked Online

Firefox-browser provider Mozilla has released an awesome new tool for seeing how you're being tracked on the Web.

From ACM News

I'm Being Followed: How Google

This morning, if you opened your browser and went to NYTimes.com, an amazing thing happened in the milliseconds between your click and when the news appeared on...

Et Tu, Google? Android Apps Can Also Secretly Copy Photos
From ACM News

Et Tu, Google? Android Apps Can Also Secretly Copy Photos

It's not just Apple. Photos are vulnerable on Android phones, too.

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says
From ACM News

Dhs, Not Nsa, Should Lead Cybersecurity, Pentagon Official Says

In the midst of an ongoing turf battle over how big a role the National Security Agency should play in securing the nation’s critical infrastructure, a Defense...

Darpa's $40k 'quest' Tests Social Media's Ability to Help in Emergency
From ACM TechNews

Darpa's $40k 'quest' Tests Social Media's Ability to Help in Emergency

DARPA has launched a contest to gain a better understanding of how social media can spread the word during a crisis.  

Despite Intrusions, Chances Of U.s.-China Cyberwar Are Small
From ACM News

Despite Intrusions, Chances Of U.s.-China Cyberwar Are Small

A panel of security and policy experts said that, despite dire warnings about the information warfare capabilities of China and other developing nations, the risk...

City With Superfast Internet Invites Innovators to Play
From ACM TechNews

City With Superfast Internet Invites Innovators to Play

Chattanooga residents have access to a 1 Gbps Internet, which is about 100 times faster than the U.S. national average, and now the city is holding a contest with...

For Impatient Web Users, an Eye Blink Is Just Too Long to Wait
From ACM News

For Impatient Web Users, an Eye Blink Is Just Too Long to Wait

Wait a second. No, that's too long.

From ACM TechNews

Science: Too Many Connections Weakens Networks

University of California, Davis researchers have found that when it comes to linking together networks or other systems, it is best to have many, but not too many...

From ACM News

How a Web Link Can Take Control of Your Phone

A chilling demonstration to a small, packed room at the RSA security conference showed how clicking a single bad Web link while using a phone running Google's Android...

­.s. Wants You to Hunt Fugitives With Twitter
From ACM News

­.s. Wants You to Hunt Fugitives With Twitter

A worldwide manhunt kicks off at the end of March—a search across America and Europe for five fugitives, identifiable only by their mugshots.

Google: Technology Is Making Science Fiction Real
From ACM News

Google: Technology Is Making Science Fiction Real

Google executive chairman Eric Schmidt predicted that rapid advances in technology will soon transform science fiction into reality—meaning people will have driverless...

Microsoft Ponders Future of Kinect, Tech
From ACM News

Microsoft Ponders Future of Kinect, Tech

When Microsoft thinks about the future of technology, it seems to do so with its stomach.

In the World of Big Data, Privacy Invasion Is the Business Model
From ACM News

In the World of Big Data, Privacy Invasion Is the Business Model

Recent weeks have seen a lot of (overdue) talk about privacy and technology. There was theflap over Path and other mobile apps uploading your phone's address books...

From ACM News

DARPA Warns: Your Iphone Is a Military Threat

There’s a growing threat to the U.S. military, according to the Pentagon's premier research wing. No, it's not Iran’s nukes or China's missiles. It's the iPads,...

Defense Department Wants More Control Over the Internet
From ACM News

Defense Department Wants More Control Over the Internet

The U.S. Department of Defense may have funded the research that led to the Internet, but freewheeling innovation created the patchwork of privately owned technology...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account