acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

The Emerging Science of Dna Cryptography

The massively parallel nature of DNA computing represents a significant threat to existing encryption schemes, but the technology also could be used to encrypt...

The Youngest Ethical Hacker in India
From ACM News

The Youngest Ethical Hacker in India

Sixteen-year-old Sahil Khan calls himself a hacker, not a cracker, a distinction that puts him on the ethical side of computer security. A "cracker" is a cyber...

From ACM TechNews

Tapia 2009 Celebration Announces Technical Program

The 2009 Richard Tapia Celebration of Diversity in Computer Conference will feature papers, panels, workshops, poster sessions, Birds-of-a-Feather meetings, a doctoral...

From ACM News

Hackers Based in China Break Into Florida Senator's Office Computers

China-based hackers breached the office computers of Democratic Sen. Bill Nelson of Florida, the senator's office confirmed March 20. In three separate attacks,...

From ACM TechNews

Safer Net Surfing Is Goal of Nist Domain Name Security Experts

Scientists from the National Institute of Standards and Technology (NIST) are developing standards, guidance, and testing procedures designed to improve the security...

Researchers Sniff Pc Keyboard Strokes From Thin Air
From ACM TechNews

Researchers Sniff Pc Keyboard Strokes From Thin Air

Research teams from the Ecole Polytechnique Federale de Lausanne in Switzerland and Inverse Path say they have discovered new techniques to read what a person is...

From ACM TechNews

Sending Out Internet Warnings For Outages, Viruses

An early warning system on the Internet could help Europe avoid deliberate or accidental outages, restrict the spread of new viruses, and ensure reliable services...

From ACM TechNews

Government Cyberattacks Militarize the Web

Distributed denial of service (DDOS) attacks are now being used by governments as another way to counter opposition, warns Arbor Networks senior security researcher...

From ACM TechNews

Berners-Lee: Semantic Web Will Have Privacy Built-In

World Wide Web Consortium director Sir Tim Berners-Lee says the Semantic Web will improve online privacy protection by allowing Internet users to control who can...

From ACM TechNews

Web Founder Issues 'snooping' Warning

Web pioneer and Massachusetts Institute of Technology professor Sir Tim Berners-Lee says more protection is needed to prevent Internet snooping and ensure that...

From ACM TechNews

IBM Looks to Secure Internet Banking With Usb Stick

A USB memory stick that can guarantee secure banking transactions even if a PC is tainted by malware has been developed by IBM's Zurich research laboratory.

The Grill: Jeannette M. Wing on the Hot Seat
From ACM TechNews

The Grill: Jeannette M. Wing on the Hot Seat

Carnegie Mellon University professor Jeannette M. Wing is an expert on computational thinking, the discipline of applying computer science's problem-solving methods...

Digital Revolutionaries Discuss Past, Future of Technology
From ACM TechNews

Digital Revolutionaries Discuss Past, Future of Technology

Microsoft technical fellow Butler Lampson, Google chief Internet evangelist Vinton Cerf, and Qualcomm chairman Irwin Jacobs discussed the past, present, and potential...

From ACM TechNews

Researchers Mine Millions of Metaphors Through Computer-Based Techniques

San Jose Mercury News (CA)A digital humanities project that started at Stanford University is teaching computers how to analyze text and extract metaphors to build...

From ACM TechNews

Oak Ridge Explores Cybots

Government Computer NewsThe Ubiquitous Network Transient Autonomous Mission Entities (UNTAME) program at Oak Ridge National Laboratory is working to develop technology...

From ACM TechNews

This Internet Fix Is No Pipe Dream

InfoWorldThe Internet's security problems could be corrected by exploiting existing standards and protocols for Web services, security, identity, and authentication...

From ACM TechNews

Cards on the Table: Low-Cost Tool Spots Software Security Flaws During Development Process

NCSU NewsNorth Carolina State University (NCSU) computer security experts have developed Protection Poker, a new risk management tool that helps software developers...

From ACM TechNews

Report From Dartmouth's Institute For Information Infrastructure Protection (i3p) Makes Cyber Security Research Recommendations

Dartmouth College's Institute for Information Infrastructure Protection (I3P) has given the U.S. Senate Committee on Homeland Security and Governmental Affairs...

From Communications of the ACM

A Difficult, Unforgettable Idea

On the 40th anniversary of Douglas C. Engelbart's "The Mother of All Demos," computer scientists discuss the event's influence — and imagine what could have been...

The Evolution of Virtualization
From Communications of the ACM

The Evolution of Virtualization

Virtualization is moving out of the data center and making inroads with mobile computing, security, and software delivery.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account