acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectPerformance And Reliability
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Nsa Growth Fueled By Need to Target Terrorists
From ACM News

Nsa Growth Fueled By Need to Target Terrorists

Twelve years later, the cranes and earthmovers around the National Security Agency are still at work, tearing up pavement and uprooting trees to make room for a...

For Nsa Chief, Terrorist Threat Drives Passion to 'collect It All,' Observers Say
From ACM News

For Nsa Chief, Terrorist Threat Drives Passion to 'collect It All,' Observers Say

In late 2005, as Iraqi roadside bombings were nearing an all-time peak, the National Security Agency's newly appointed chief began pitching a radical plan for halting...

The Coming Political Battle Over Bitcoin
From ACM Opinion

The Coming Political Battle Over Bitcoin

Given that Bitcoin first broke into mainstream attention when Gawker explained how to use it to buy drugs, perhaps the surprise is that it took federal regulators...

Little-Known Surveillance Tool Raises Concerns By Judges, Privacy Activists
From ACM News

Little-Known Surveillance Tool Raises Concerns By Judges, Privacy Activists

Federal investigators in Northern California routinely used a sophisticated surveillance system to scoop up data from cellphones and other wireless devices in an...

Pentagon Creating Teams to Launch Cyberattacks as Threat Grows
From ACM News

Pentagon Creating Teams to Launch Cyberattacks as Threat Grows

The Pentagon's Cyber Command will create 13 offensive teams by the fall of 2015 to help defend the nation against major computer attacks from abroad, Gen. Keith...

Web-Connected Cars Bring Privacy Concerns
From ACM News

Web-Connected Cars Bring Privacy Concerns

Cars will soon be so linked into wireless networks they will be like giant rolling smartphones—with calling systems, streaming video, cameras, and apps ­capable...

Google Asks: How Much Is Mapping Worth?
From ACM Careers

Google Asks: How Much Is Mapping Worth?

How much has mapping software changed your life?

Banks Seek Nsa Help Amid Attacks on Their Computer Systems
From ACM News

Banks Seek Nsa Help Amid Attacks on Their Computer Systems

Major U.S. banks have turned to the National Security Agency for help protecting their computer systems after a barrage of assaults that have disrupted their Web...

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive
From ACM News

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive

Some of the most important clues about what drove Adam Lanza to mass murder probably sit on the computer that the reclusive, technical-minded 20-year-old used as...

In South Korea, the Republic of Samsung
From ACM Careers

In South Korea, the Republic of Samsung

So sprawling is Samsung’s modern-day empire that some South Koreans say it has become possible to live a Samsung-only life: You can use a Samsung credit card to...

Hacker Locates John Mcafee Through Smartphone Tracks
From ACM News

Hacker Locates John Mcafee Through Smartphone Tracks

Weeks of international intrigue about the whereabouts of tech millionaire John McAfee ended Tuesday after the Internet pioneer made an elementary digital mistake...

Web Monitor: 100 Percent of Syria's Internet Just Shut Down
From ACM News

Web Monitor: 100 Percent of Syria's Internet Just Shut Down

It appears that the Syrian government may have just taken a drastic measure it has conspicuously avoided over the nearly two years of fighting: cutting itself off...

From ACM News

When Is a Cyberattack an Act of War?

On the night of Oct. 11, Defense Secretary Leon Panetta stood inside the Intrepid Sea, Air and Space Museum, housed in a former aircraft carrier moored at a New...

The Economics of Video Games
From ACM News

The Economics of Video Games

Inflation can be a headache for any central banker. But it takes a certain type of economist to know what to do when a belligerent spaceship fleet attacks an interstellar...

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems
From ACM News

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems

The emails arrived like poison darts from cyberspace.

Gps Technology Finding Its Way Into Court
From ACM News

Gps Technology Finding Its Way Into Court

The rapid spread of cellphones with GPS technology has allowed police to track suspects with unprecedented precision—even as they commit crimes. But the legal fight...

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks
From ACM News

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks

John Sublett and his colleagues had an audacious, digital-age plan. They wanted to use the Internet to enable businesses to manage any kind of electronic device...

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say
From ACM News

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed...

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks
From ACM News

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks

It began as a hobby for a ­teenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet.

Nasa Probe Offers New View of Mercury: Alien World Right in Our Back Yard
From ACM News

Nasa Probe Offers New View of Mercury: Alien World Right in Our Back Yard

The overheated, underappreciated runt of the solar system is finally getting some attention.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account