acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Signing Contracts on the Telephone
From ACM TechNews

Signing Contracts on the Telephone

The Fraunhofer Institute for Secure Information Technology (SIT) in Germany has developed VoIPS, software that prevents the tampering and manipulation of telephone...

From ACM News

U.k. Report on Chinese Spying 'unsubstantiated'

A Chinese military expert Sunday (January 31) refuted claims by the U.K.'s national security intelligence agency that China has engaged in commercial espionage,...

Smart Dust? Not Quite, but We
From ACM News

Smart Dust? Not Quite, but We

In computing, the vision always precedes the reality by a decade or more. The pattern has held true from the personal computer to the Internet, as it takes time...

China's Cyber War on the ­nited States
From ACM News

China's Cyber War on the ­nited States

In the U.S. Naval Network Warfare Command, the largest threats against U.S. computer networks originate from Chinese hackers. According to a report from Federal...

Parallel Algorithm Leads to Cryptography Breakthrough
From ACM News

Parallel Algorithm Leads to Cryptography Breakthrough

Pico Computing announced that it has achieved the highest-known benchmark speeds for 56-bit DES decryption, with reported throughput of over 280 billion keys per...

Researchers Criticize 3D Secure Credit Card Authentication
From ACM TechNews

Researchers Criticize 3D Secure Credit Card Authentication

University of Cambridge Computer Laboratory researchers Steven J. Murdoch and Ross Anderson contend in a paper that the 3D Secure credit card authentication system...

From ACM News

Eff Reveals How Your Digital Fingerprint Makes You Easy to Track

Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again. The Electronic Frontier Foundation (EFF) has launched...

From ACM News

Innovative Technique Can Spot Errors in Key Technological Systems

An innovative computational technique that draws on statistics, imaging, and other disciplines has the capability to detect errors in sensitive technological systems...

Report Reveals Critical Infrastructure ­nder Constant Cyber Attack
From ACM News

Report Reveals Critical Infrastructure ­nder Constant Cyber Attack

The staggering cost and impact of cyber attacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and transportation...

To Beat Spam, Turn Its Own Weapons Against It
From ACM TechNews

To Beat Spam, Turn Its Own Weapons Against It

Researchers from the International Computer Science Institute and the University of California, San Diego have developed a method for blocking the most common type...

From ACM News

U.s. Businesses Face Increasing Threats From Chinese Cyber Attacks

U.S. businesses and government agencies are facing increasing risks of potential cyber attacks from China, according to a recent report. And IT departments that...

From ACM News

Pentagon Searches For

One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying...

In Digital Combat, U.s. Finds No Easy Deterrent
From ACM News

In Digital Combat, U.s. Finds No Easy Deterrent

On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the...

Software to Test Cybersecurity Systems For Flaws
From ACM News

Software to Test Cybersecurity Systems For Flaws

Cybersecurity systems are tough to crack, but not tough enough. A Clarkson University professor is developing software programs that will test cybersecurity systems...

From Communications of the ACM

ACM Fellows Honored

Forty-seven men and women are inducted as 2009 ACM Fellows.

Type Theory Comes of Age
From Communications of the ACM

Type Theory Comes of Age

Type systems are moving beyond the realm of data structure and into more complex domains like security and networking.

Security Technique Protects Multi-Party Computation
From ACM News

Security Technique Protects Multi-Party Computation

Recent academic research is advancing the development of secure multi-party computation (SMC), an security technique aimed at protecting data for various online...

From ACM News

Grid Computing and the Future of Cloud Computing

In the late 1990s and early 2000s, the idea of grid computing, a type of distributed computing that harnesses the power of many computers to handle large computational...

From ACM News

Industry Says Gov't Must Regulate 'cloud' to Protect User Privacy

The federal government needs to address electronic security to calm Americans' uncertainty about cloud computing and secure its privacy, according to industry representatives...

From ACM News

If Your Password Is 123456, Just Make It Hackme

Back at the dawn of the Web, the most popular account password was “12345.” Today, it’s one digit longer but hardly safer: “123456.” Despite all the reports...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account