acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Explainer: P vs. Np
From ACM TechNews

The Explainer: P vs. Np

The Clay Mathematics Institute has a standing offer of $1 million for anyone who is able to prove or disprove one of seven problems that have never been solved....

Nist Test Proves 'the Eyes Have It' For Id Verification
From ACM News

Nist Test Proves 'the Eyes Have It' For Id Verification

The intricate structure of the iris constitutes a powerful biometric. A new report from the National Institute of Standards and Technology (NIST) demonstrates that...

Social Networking Meets Ambient Intelligence
From ICT Results

Social Networking Meets Ambient Intelligence

Sharing small snippets of information about your daily life is a key feature of the online social networking revolution. Soon status updates and other social information...

­.s. Cyber War Policy Needs New Focus, Experts Say
From ACM TechNews

­.s. Cyber War Policy Needs New Focus, Experts Say

Three cybersecurity experts recently told a meeting of the Congressional Cyber Caucus that current U.S. policies for protecting the United States against various...

From ACM TechNews

Software That Fixes Itself

Massachusetts Institute of Technology researchers led by professor Martin Rinard have developed ClearView, software capable of finding and fixing certain types...

Bogus E-Mails From Fdic Link Computer ­sers to Viruses, Expert Says
From ACM TechNews

Bogus E-Mails From Fdic Link Computer ­sers to Viruses, Expert Says

Computer forensics researchers at the University of Alabama at Birmingham (UAB) have been tracking new spam that claims to come from the U.S. Federal Deposit Insurance...

From ACM TechNews

Eavesdropping on Smartphone Secrets

Security researchers at Cryptography Research say the smart card attack involving differential power analysis could be used to target smartphones. Cryptography...

Internet Set For Change With Non-English Addresses
From ACM TechNews

Internet Set For Change With Non-English Addresses

Internationalized domain names (IDNs) will be one of the central topics at ICANN’s 36th International Public Meeting, which takes place October 25-30 in Seoul,...

Scan of Internet ­ncovers Thousands of Vulnerable Embedded Devices
From ACM TechNews

Scan of Internet ­ncovers Thousands of Vulnerable Embedded Devices

A scan of the Internet by Columbia University researchers searching for vulnerable embedded devices has found that nearly 21,000 routers, Webcams, and VoIP products...

Smartphone Security Threats Likely to Rise
From ACM News

Smartphone Security Threats Likely to Rise

Internet security experts say that worms, spam, viruses and hackers could be well on their way into your smartphone, whose rising popularity makes them sweeter...

From ACM TechNews

To Protect Your Privacy, Hand Over Your Data

A new proposal from the Massachusetts Institute of Technology's (MIT's) Human Dynamics Laboratory suggests that digital identities would be more secure if they...

From ACM TechNews

Vulnerability Seen in Amazon's Cloud-Computing

A new study by researchers from the Massachusetts Institute of Technology (MIT) and the University of California, San Diego (UCSD) suggests that leading cloud-computing...

Researchers Help Ensure Security of Military Logistics
From ACM TechNews

Researchers Help Ensure Security of Military Logistics

University of Texas at Dallas (UTD) professor Bhavani Thuraisingham, director of UTD's CyberSecurity Research Center, believes it is possible to establish data...

Exploring New Frontiers
From Communications of the ACM

Exploring New Frontiers

The Expeditions in Computing program provides scientists with the funding to work on ambitious, often multidisciplinary research.

From ACM News

First Gordon Prize in Managing Cybersecurity Resources Awarded

The first $1,000 Gordon Prize in Managing Cybersecurity Resources goes for an essay written by researchers from Harvard and Dresden, Germany. Maryland's Robert...

Tracking Devious Phishing Web Sites
From ACM TechNews

Tracking Devious Phishing Web Sites

Internet security experts have discovered that many phishers are using a trick called a flux, which allows a fake Web site to rapidly change its URL, making it...

From ACM TechNews

Field Experiment on a Metropolitan Quantum Cryptography Network

The University of Science and Technology of China recently demonstrated a metropolitan quantum cryptography network (QCN) for use by the government in Wuhu, China...

From ACM TechNews

Conference Focuses on Preventing High-Capacity Computer Data Theft

At the recent International Conference on Applied Modeling and Information Security Systems, high-performance computing researchers cautioned that worldwide computer...

From ACM News

Northeastern Launches Online Master's Degree Program in Information Security

Northeastern University is launching an online graduate degree program in information assurance (IA). The program, which will train students to tackle identity...

From ACM News

Eight-State Cyber Consortium Gets $2.7 Million Grant

The U.S. National Science Foundation has awarded a $2.7 million grant to an eight-state consortium of technology centers and community colleges that is working...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account