acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Ornl Has Key Role in Doe Cybersecurity For Energy Effort

With the transition to a smart grid comes new opportunities for hackers, but researchers at the U.S. Department of Energy's Oak Ridge National Laboratory are working...

From ACM News

Ban Naughty Countries From the Net: Former Intelligence Chief

Countries in Eastern Europe and Africa that harbor cyber criminals should be locked out of the global Internet until their governments do something to reduce...

Sick PCs Should Be Banned From the Net Says Microsoft
From ACM TechNews

Sick PCs Should Be Banned From the Net Says Microsoft

Microsoft researcher Scott Charney recently presented an Internet security proposal that requires users to present a "health certificate" to prove that their PCs...

Android Invasion
From ACM News

Android Invasion

How a tiny piece of software created by a few Google engineers is ushering in the mobile revolution and reshaping the fortunes of the world's biggest tech companies...

From ACM News

Now Your App Knows Where You Are

Geolocation analytics could help companies to improve their apps—and make more money from them.

From ACM News

Georgia Tech Releases Cyber Threats Forecast for 2011

The Georgia Tech Information Security Center (GTISC) has released the GTISC Emerging Cyber Threats Report for 2011, outlining the top three areas of security risk...

From ACM TechNews

Mit Researchers Tout Network Intrusion Recovery System

Massachusetts Institute of Technology researchers are developing RETRO, a system designed to make it easier for organizations to recover from security breaches. ...

Researchers Argue For Smarter Traffic Lights
From ACM TechNews

Researchers Argue For Smarter Traffic Lights

Swiss Federal Institute of Technology Zurich's Dirk Helbing and Dresden University of Technology's Stefan Lammer have proposed using a combination of sensing technology...

From ACM News

Blade Software Eliminates 'drive-By Downloads' from Malicious Websites

Researchers have developed a new tool that eliminates so-called 'drive-by download' threats. BLADE is browser-independent and when tested, it blocked all drive-by...

Power Hackers: The U.s. Smart Grid Is Shaping Up to Be Dangerously Insecure
From ACM News

Power Hackers: The U.s. Smart Grid Is Shaping Up to Be Dangerously Insecure

Achieving greater efficiency and control of the electricity grid requires hooking almost every aspect of it up to the Internet, making it more vulnerable to cyber...

Tapping the Powers of Persuasion
From ACM News

Tapping the Powers of Persuasion

B.J. Fogg's lab at Stanford focuses on the ways technology can influence behavior.

From ACM News

Digital 'fingerprints' to Stop Phone Phishing Scams

Phishing scams are making the leap from email to the world's voice systems, and a team of researchers in the Georgia Tech College of Computing has found a way to...

Stuxnet: Fact vs. Theory
From ACM News

Stuxnet: Fact vs. Theory

The Stuxnet worm has taken the computer security world by storm, inspiring talk of  a government-sponsored cyberwar, and of a software program laden with obscure...

Gtri Creates Cyber Technology and Information Security Laboratory
From ACM News

Gtri Creates Cyber Technology and Information Security Laboratory

The Georgia Tech Research Institute (GTRI) has created a new Cyber Technology and Information Security Laboratory to apply GTRI's broad expertise and systems engineering...

From ACM TechNews

Eu Seeks to Boost Defenses Against Cyber Attacks

The European Commission has made several proposals designed to counter large-scale cyberattacks that could paralyze the computer networks of European Union nations...

Professor Wendy Hall Speaks
From ACM TechNews

Professor Wendy Hall Speaks

Dame Wendy Hall of the University of Southampton says she is interested in "what makes the Web what it is, how it evolves and will evolve, what are the scenarios...

From ACM News

One Program to Watch Them All: DARPA

The Pentagon’s surveillance net is massive. But it was holes and seams. Spy drone videos and communications intercepts may be aimed at the same target. Analysts...

Signing Made Easy
From ACM News

Signing Made Easy

From video games to cell phone apps, making sign language easier to learn Put on the gloves. Turn on the camera and... action!

Would Wiretapping Laws Spell the End of Quantum Encryption?
From ACM News

Would Wiretapping Laws Spell the End of Quantum Encryption?

A new effort to ensure that the government can gain back-door access to encrypted messages could thwart one of the most promising applications of physics for...

Stuxnet Worm Heralds New Era of Global Cyberwar
From ACM News

Stuxnet Worm Heralds New Era of Global Cyberwar

Attack aimed at Iran nuclear plant and recently revealed 2008 incident at US base show spread of cyber weapons.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account