acm-header
Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


U.s. Ups Ante For Spying on Firms
From ACM News

U.s. Ups Ante For Spying on Firms

The White House threatened China and other countries with trade and diplomatic action over corporate espionage as it cataloged more than a dozen cases of cyberattacks...

Top ­.s. Stealth Jet Has to Talk to Allied Planes Over ­nsecured Radio
From ACM News

Top ­.s. Stealth Jet Has to Talk to Allied Planes Over ­nsecured Radio

For the first time, America's top-of-the-line F-22 fighters and Britain's own cutting-edge Typhoon jets have come together for intensive, long-term training in...

Exposé of Chinese Data Thieves Reveals Sloppy Tactics
From ACM News

Exposé of Chinese Data Thieves Reveals Sloppy Tactics

A beige office block in Shanghai's suburbs belonging to the Chinese army became world famous on Tuesday after Mandiant, a Washington-based computer security company...

Cybercrime: It's Serious, But Exactly How Serious?
From Communications of the ACM

Cybercrime: It's Serious, But Exactly How Serious?

Symantec says $110 billion annually while McAfee says $1 trillion. Why can't anyone agree?

Data Mining Is New Lobbying Gold
From ACM Careers

Data Mining Is New Lobbying Gold

A congressman gets an earful from his neighbor after church about a tax bill. A senator suddenly finds old high school classmates calling her about an upcoming...

When Will the Internet Reach Its Limit (and How Do We Stop It from Happening)?
From ACM Opinion

When Will the Internet Reach Its Limit (and How Do We Stop It from Happening)?

The number of smartphones, tablets and other network-connected gadgets will outnumber humans by the end of the year.

Software that Tracks People on Social Media Created By Defence Firm
From ACM News

Software that Tracks People on Social Media Created By Defence Firm

A multinational security firm has secretly developed software capable of tracking people's movements and predicting future behaviour by mining data from social...

Chinese Army Unit Is Seen as Tied to Hacking Against U.s.
From ACM News

Chinese Army Unit Is Seen as Tied to Hacking Against U.s.

On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People's Liberation Army base for China’s growing corps...

New High-Tech Warfare Medal Draws Backlash
From ACM News

New High-Tech Warfare Medal Draws Backlash

The Pentagon sparked an uproar among troops and veterans when it revealed that a new high-level medal honoring drone pilots will rank above some traditional combat...

Amid the Patent Wars, a Powerful Pact of Non-Aggression
From ACM Careers

Amid the Patent Wars, a Powerful Pact of Non-Aggression

The Open Invention Network, a community set up by an IBM-led consortium in 2005 to foster a safe patent environment for developers and users of the free, open-source...

Welcome to the Malware-Industrial Complex
From ACM News

Welcome to the Malware-Industrial Complex

Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating...

Silicon Valley and Immigrant Groups Find Common Cause
From ACM News

Silicon Valley and Immigrant Groups Find Common Cause

What do computer programmers and illegal immigrants have to do with each other?

Pentagon Creates New Medal For Cyber, Drone Wars
From ACM Careers

Pentagon Creates New Medal For Cyber, Drone Wars

They fight the war from computer consoles and video screens.

In Cyberwar, Software Flaws Are a Hot Commodity
From ACM News

In Cyberwar, Software Flaws Are a Hot Commodity

There have been security flaws in software as long as there has been software, but they have become even more critically important in the context of cyberweapons...

Obama Order Gives Firms Cyberthreat Information
From ACM News

Obama Order Gives Firms Cyberthreat Information

President Obama signed an executive order on Tuesday that promotes increased information sharing about cyberthreats between the government and private companies...

3d Software Key to Designing Many of Today's Consumer Products
From ACM News

3d Software Key to Designing Many of Today's Consumer Products

While developing an electric bicycle for his San Rafael company, Marcus Hays had planned to insert a battery into one of the bike's supporting tubes. But then he...

At Facebook, Zero-Day Exploits, Backdoor Code Bring War Games Drill to Life
From ACM News

At Facebook, Zero-Day Exploits, Backdoor Code Bring War Games Drill to Life

Early on Halloween morning, members of Facebook's Computer Emergency Response Team received an urgent email from an FBI special agent who regularly briefs them...

Apple and Samsung, Frenemies For Life
From ACM Opinion

Apple and Samsung, Frenemies For Life

It was the late Steve Jobs' worst nightmare. A powerful Asian manufacturer, Samsung Electronics Co Ltd, uses Google Inc's Android software to create smartphones...

Sewing Machines Go High-Tech
From ACM News

Sewing Machines Go High-Tech

The old-fashioned sewing machine is finally getting a modern makeover.

Self-Driving Cars More Jetsons Than Reality for Google Designers
From ACM News

Self-Driving Cars More Jetsons Than Reality for Google Designers

Google Inc. sees self-driving cars being available to consumers in three to five years. Regulators and the insurance industry aren't so sure it can happen that...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account