Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectLegal Aspects
authorNetwork World

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


5 Burning Questions With New Ietf Chair and Cisco Fellow Alissa Cooper
From ACM TechNews

5 Burning Questions With New Ietf Chair and Cisco Fellow Alissa Cooper

New Internet Engineering Task Force chair and Cisco Fellow Alissa Cooper lauds the organization as "a very special place because of the standards work it has done...

Trump Immigration Halt Casts Dark Cloud Over Next Ietf Gathering
From ACM TechNews

Trump Immigration Halt Casts Dark Cloud Over Next Ietf Gathering

The Internet Engineering Task Force's March meeting in Chicago could have a significantly reduced turnout because of the Trump administration's ban on admission...

National Science Foundation Doles Out $12m For Wireless Growth
From ACM TechNews

National Science Foundation Doles Out $12m For Wireless Growth

The U.S. National Science Foundation on Tuesday distributed 11 grants, totaling $12 million, to researchers working to expand the reach of wireless technology.

World's Top Cryptographers on Encryption Backdoors: No Way
From ACM TechNews

World's Top Cryptographers on Encryption Backdoors: No Way

A panel of leading cryptographers at this week's RSA Conference agreed inserting backdoors to unscramble encrypted communications is a threat to confidentiality...

British Voice Encryption Protocol Has Massive Weakness, Researcher Says
From ACM TechNews

British Voice Encryption Protocol Has Massive Weakness, Researcher Says

A researcher charges the protocol created by a U.K. governmental group to encrypt voice calls has a weakness built into it by design that could enable mass surveillance...

Tim Berners-Lee Wants Internet Magna Carta to Guarantee Netizens' Privacy
From ACM TechNews

Tim Berners-Lee Wants Internet Magna Carta to Guarantee Netizens' Privacy

Sir Tim Berners-Lee is using the 25th anniversary of his invention of the World Wide Web to push for an Internet bill of rights.

Hacking Traffic Lights With a Laptop Is Easy
From ACM TechNews

Hacking Traffic Lights With a Laptop Is Easy

Security researchers with permission from local road authorities hacked into nearly 100 wirelessly networked traffic lights and were able to change the lights on...

Google’s Vint Cerf Defines Internet of Things Challenges
From ACM TechNews

Google’s Vint Cerf Defines Internet of Things Challenges

Google chief Internet evangelist and ACM president Vint Cerf said strong regulations are needed to address privacy and other challenges the Internet of Things presents...

To Thwart Spies, IETF Wants to 'Strengthen the Internet'
From ACM TechNews

To Thwart Spies, IETF Wants to 'Strengthen the Internet'

Internet Engineering Task Force chair Jari Arkko recently spoke about the need for the engineers behind the Internet to push for new standards that would make it...

Looking Forward to a Future Internet
From ACM TechNews

Looking Forward to a Future Internet

The future of the Internet was in doubt heading into December and the World Conference on International Telecommunications.  Neither those who want to control the...

Insider Security Threat Gets a Serious Look By ­.s. Security Agencies
From ACM TechNews

Insider Security Threat Gets a Serious Look By ­.s. Security Agencies

Researchers at the U.S. Department of Homeland Security, the U.S. Secret Service, and Carnegie Mellon University recently published a study that examined the technical...

Symantec: World Has 2.2 Zettabytes of Business Data That Costs $1.1 Trillion to Store and Secure
From ACM TechNews

Symantec: World Has 2.2 Zettabytes of Business Data That Costs $1.1 Trillion to Store and Secure

Organizations globally hold approximately 2.2 zettabytes of data and spend roughly $1.1 trillion to secure and provide access to it, according to a new Symantec...

From ACM News

Faq on Son of Stuxnet

What is Duqu? Duqu (pronounced dyu kyu) is primarily a remote-access Trojan targeted at a limited number of organizations in Europe, Africa, and the Middle East...

From ACM News

Black Hat Pwnie Award Winner Will Be a Criminal

Law enforcement may be interested to see if anyone actually shows up to this year to accept the annual Pwnie Award for Epic Ownage at Black Hat, since all the nominees...

From ACM News

After Delay, Hacker to Show Flaws in Siemens Industrial Gear

A security researcher who says he's found serious problems with Siemens computers used in power plants and heavy industry is now expecting to go public with his...

From ACM News

Siemens Scada Hacking Talk Pulled Over Security Concerns

A planned presentation on security vulnerabilities in Siemens industrial control systems was pulled Wednesday over worries that the information in the talk was...

From ACM News

Does Rsa Securid Have a ­.s. Gov't-Authorized Back Door?

Does the RSA SecurID two-token authentication system include a back door that was built in at the request of the U.S. government in exchange for letting RSA export...

From ACM News

20 Hot It Security Issues

From malware on Google's Android phones to the U.S. Defense Advanced Research Projects Agency trying to understand how stories or narratives impact security and...

From ACM News

Search Engine Optimization 'poisoning' Way Up This Year: Report

Websense says 22.4% of Google searches lead to bad URLs vs. 13.7% at end of 2009.

From ACM TechNews

Domain-Name Abuse Proliferates; Rogue Registrars Turn a Blind Eye

Domain name abuse continues to be a serious problem, which is too often proliferated by some registrars who are willing to overlook phony registration information...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account