acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorNature
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Physics: Quantum Computer Quest
From ACM News

Physics: Quantum Computer Quest

When asked what he likes best about working for Google, physicist John Martinis does not mention the famous massage chairs in the hallways, or the free snacks available...

­S Regulators Move on Thought-Controlled Prosthetics
From ACM News

­S Regulators Move on Thought-Controlled Prosthetics

For the first time since accidents severed the neural connection between their brains and limbs, a small number of patients are reaching out and feeling the world...

Basic Science Finds Corporate Refuge
From ACM News

Basic Science Finds Corporate Refuge

Microsoft makes Windows, Word, and the Xbox. But it also employs scientists who make sensors to stick on the hides of elephants and rhinoceroses.

Mugshots Built from Dna Data
From ACM News

Mugshots Built from Dna Data

Leaving a hair at a crime scene could one day be as damning as leaving a photograph of your face.

Is the $1,000 Genome For Real?
From ACM News

Is the $1,000 Genome For Real?


The Best Time to Wage Cyberwar
From ACM News

The Best Time to Wage Cyberwar

If you discover a way to hack into your enemy's computers, do you strike while the iron is hot, or patiently wait for a better opportunity to arise?

Researchers Split Over NSA Hacking
From ACM Careers

Researchers Split Over NSA Hacking

The U.S. National Security Agency (NSA) has upset a great many people this year.

Quantum Cryptography Conquers Noise Problem
From ACM News

Quantum Cryptography Conquers Noise Problem

It's hard to stand out from the crowd—particularly if you are a single photon in a sea of millions in an optical fibre.

From ACM News

Full-Field Implementation of a Perfect Eavesdropper on a Quantum Cryptography System

Quantum key distribution allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality...

Computer Security: Is This the Start of Cyberwarfare?
From ACM TechNews

Computer Security: Is This the Start of Cyberwarfare?

The emergence of the Stuxnet worm signals that groups or nations could launch a cyberattack that targets critical infrastructure and threatens to cause physical...

Hackers Blind Quantum Cryptographers
From ACM News

Hackers Blind Quantum Cryptographers

Lasers crack commercial encryption systems, leaving no trace.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account