acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Black Hat: Legal Pitfalls of Investigating Mobile

Hackers today are testing mobile devices ever more strenuously, but the work often stands on shaky legal ground, according to Jennifer Granick, an attorney for...

From ACM News

Your Smartphone: A New Frontier For Hackers

Last week, security researchers uncovered yet another strain of malicious software aimed at smartphones that run Google's popular Android operating system. The...

From ACM News

Your Face

Imagine being able to sit down in a bar, snap a few photos of people, and quickly learn who they are, who their friends are, where they live, what kind of music...

European Security Group Issues Warning on HTML5
From ACM TechNews

European Security Group Issues Warning on HTML5

New standards under development as part of HTML5 neglect important security issues, according to a European Network and Information Security Agency (ENISA) report...

Georgia Tech Proposes Internet Consumer Nutrition Label
From ACM TechNews

Georgia Tech Proposes Internet Consumer Nutrition Label

A recent Georgia Tech University study of Internet service providers (ISPs) concluded that ISPs should provide easy-to-understand information about service-limiting...

Costly Drone Is Poised to Replace ­-2 Spy Plane
From ACM News

Costly Drone Is Poised to Replace ­-2 Spy Plane

Tucked away here in the Mojave Desert, the assembly plant for the high-flying Global Hawk jet resembles a giant hobby shop. Work tables surround a handful of...

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls
From ACM News

Diy Spy Drone Sniffs Wi-Fi, Intercepts Phone Calls

What do you do when the target you’re spying on slips behind his home-security gates and beyond your reach? Launch your personal, specially equipped WASP drone—short...

Can Video Kill the Credit-Card Form?
From ACM News

Can Video Kill the Credit-Card Form?

The days of tediously having to punch in credit-card details whenever you make an online purchase may be numbered, thanks to a new payment system that turns any...

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future
From ACM News

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future

Ever since Google announced that its Android phones would be equipped with a "digital wallet" that allows users to pay for things simply by touching their phone...

From ACM News

Shady Rat Hacking Is Not About China

Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...

From ACM News

Operation Shady RAT May Be the Biggest Hack in History but Is No Surprise

Anybody involved in the IT and cybersecurity industry knows that every major industry and government agency around the world is under threat of intrusion through...

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems
From ACM News

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems

A security researcher has uncovered a slew of vulnerabilities in Siemens industrial control systems, including a hard-coded password, that would let attackers...

China Aims to Renew Status As Scientific Superpower
From ACM News

China Aims to Renew Status As Scientific Superpower

China was probably the world's earliest technological superpower, inventing the plow, the compass, gunpowder, and block printing. Then, science in the Middle...

Major Breakthrough Claimed in Wireless Technology
From ACM News

Major Breakthrough Claimed in Wireless Technology

Dropped calls, unsent texts, painfully slow Internet connections and overcrowded Wi-Fi hot spots have become a bane of modern life. But veteran valley entrepreneur...

From ACM News

Marvell Tapped By China to Develop Mobile Phone Standard

Chipmaker Marvell, whose top management is based in Santa Clara, has been tapped to help China achieve the goal of creating its own mobile technology standards...

From ACM News

Pentagon Seeks a Few Good Social Networkers

The Pentagon is developing plans to use social networking sites like Facebook and Twitter as both a resource and a weapon in future conflicts. Its research and...

Meet Dark Tangent, the Hacker Behind Black Hat and Def Con
From ACM News

Meet Dark Tangent, the Hacker Behind Black Hat and Def Con

The word "hacker" evokes all kinds of scary images. But Jeff Moss says hackers are exactly what the world needs more of, because they can make the Internet safer...

A New Planning Tool Helps Direct Traffic on Aircraft Carriers
From ACM News

A New Planning Tool Helps Direct Traffic on Aircraft Carriers

On the deck of an aircraft carrier, where up to 60 aircraft are crammed into 4.5 acres (1.8 hectares), real estate is at a premium. While aircraft directors wave...

Can Microsoft Make You 'bing'?
From ACM News

Can Microsoft Make You 'bing'?

Mike Nichols has a poster on his office wall. It shows the young Muhammad Ali glaring down at a fallen Sonny Liston, the bruising heavyweight who had seemed invincible...

Researchers Expose Cunning Online Tracking Service That Can
From ACM News

Researchers Expose Cunning Online Tracking Service That Can

Researchers at U.C. Berkeley have discovered that some of the net's most popular sites are using a tracking service that can't be evaded—even when users block...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account