acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Computer Spies Breach Fighter-Jet Project
From ACM News

Computer Spies Breach Fighter-Jet Project

Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project — the Defense Department's costliest weapons program ever — according to...

Smartphones Seen as Eventual Target of Computer Virus Attacks
From ACM TechNews

Smartphones Seen as Eventual Target of Computer Virus Attacks

Northeastern University researchers say that smartphones will soon be targeted by viruses on a massive scale, but a study by the researchers could provide a way...

Harnessing Spammers to Solve AI Problems
From ACM TechNews

Harnessing Spammers to Solve AI Problems

Some Completely Automated Public Turing Test To Tell Computers and Humans Apart (CAPTCHAs) security systems are already being solved by spammers, but CAPTCHA co...

From ACM TechNews

Cyber Spying a Threat, and Everyone Is In On It

The computers of Tibetan exiles and the U.S. electrical grid were recently breached by hackers, highlighting the growing threat of cyber espionage. The White House...

From ACM TechNews

Artificial Intelligence to Tackle Rogue Traders

The University of Sunderland's Computerized Analysis of Stocks and Shares for Novelty Detection of Radical Activities (CASSANDRA) project is developing a software...

From ACM TechNews

Electrosmog on the Circuit Board

Electronic components continue to be made smaller and smaller, which reduces the amount of power that they require but increases signal-to-noise ratios. If electronic...

Purdue, Rutgers Will Lead $30 Million ­U.S. Homeland Security Research Center
From ACM TechNews

Purdue, Rutgers Will Lead $30 Million ­U.S. Homeland Security Research Center

Purdue University and Rutgers University will lead an international research and education group in a six-year, $30 million U.S. Department of Homeland Security...

'Smart Dew' Motes Serve as Invisible Security Guards
From ACM TechNews

'Smart Dew' Motes Serve as Invisible Security Guards

Tel Aviv University researchers have developed Smart Dew, tiny sensors as small as dewdrops that can be arranged in a network. The inexpensive sensors are equipped...

From ACM TechNews

Experts See Early Activity From the Conficker Worm

An informal group of computer security experts said they have observed early attempts by the Conficker virus to communicate with a control server, but they are...

Top 10 Technology Skills
From ACM TechNews

Top 10 Technology Skills

Although many sectors of the economy are struggling to survive, the information technology (IT) industry is still relatively strong. Employment experts say that...

From ACM TechNews

Eurosys 2009 Explores Future Computer System Designs

The EuroSys 2009 conference, sponsored by the European chapter of ACM's Special Interest Group on Operating Systems, will focus on computer system research that...

From ACM News

Canadian Researchers Reveal How They Cracked Chinese Spy Scam

A 34-year-old student and part-time tech geek at Toronto's Munk Centre for International Studies tried everything to track down a piece of malicious software that...

From ACM News

Researchers ­ncover Chinese Cyber Plot Against Foreign Missions

Canadian researchers have reportedly uncovered a Chinese cyber plot that hacked the Web sites of the Tibetan spiritual leader, the Dalai Lama, and systems in the...

From ACM News

India Calls For International Crisis Management Plan For Cyber Crimes

Concerned over the growing number of cyber crime cases in its country, the Indian Government on Thursday (March 26) said that an international crisis management...

Scholarship Program Targets Need For Cyber Security Skills
From ACM TechNews

Scholarship Program Targets Need For Cyber Security Skills

The Scholarship for Service (SFS) program, jointly run by the National Science Foundation and the U.S. Department of Homeland Security (DHS), is becoming a widely...

From ACM TechNews

The Emerging Science of Dna Cryptography

The massively parallel nature of DNA computing represents a significant threat to existing encryption schemes, but the technology also could be used to encrypt...

The Youngest Ethical Hacker in India
From ACM News

The Youngest Ethical Hacker in India

Sixteen-year-old Sahil Khan calls himself a hacker, not a cracker, a distinction that puts him on the ethical side of computer security. A "cracker" is a cyber...

From ACM TechNews

Tapia 2009 Celebration Announces Technical Program

The 2009 Richard Tapia Celebration of Diversity in Computer Conference will feature papers, panels, workshops, poster sessions, Birds-of-a-Feather meetings, a doctoral...

From ACM News

Hackers Based in China Break Into Florida Senator's Office Computers

China-based hackers breached the office computers of Democratic Sen. Bill Nelson of Florida, the senator's office confirmed March 20. In three separate attacks,...

From ACM TechNews

Safer Net Surfing Is Goal of Nist Domain Name Security Experts

Scientists from the National Institute of Standards and Technology (NIST) are developing standards, guidance, and testing procedures designed to improve the security...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account