acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Scan of Internet ­ncovers Thousands of Vulnerable Embedded Devices
From ACM TechNews

Scan of Internet ­ncovers Thousands of Vulnerable Embedded Devices

A scan of the Internet by Columbia University researchers searching for vulnerable embedded devices has found that nearly 21,000 routers, Webcams, and VoIP products...

Smartphone Security Threats Likely to Rise
From ACM News

Smartphone Security Threats Likely to Rise

Internet security experts say that worms, spam, viruses and hackers could be well on their way into your smartphone, whose rising popularity makes them sweeter...

From ACM TechNews

To Protect Your Privacy, Hand Over Your Data

A new proposal from the Massachusetts Institute of Technology's (MIT's) Human Dynamics Laboratory suggests that digital identities would be more secure if they...

From ACM TechNews

Vulnerability Seen in Amazon's Cloud-Computing

A new study by researchers from the Massachusetts Institute of Technology (MIT) and the University of California, San Diego (UCSD) suggests that leading cloud-computing...

Researchers Help Ensure Security of Military Logistics
From ACM TechNews

Researchers Help Ensure Security of Military Logistics

University of Texas at Dallas (UTD) professor Bhavani Thuraisingham, director of UTD's CyberSecurity Research Center, believes it is possible to establish data...

Exploring New Frontiers
From Communications of the ACM

Exploring New Frontiers

The Expeditions in Computing program provides scientists with the funding to work on ambitious, often multidisciplinary research.

From ACM News

First Gordon Prize in Managing Cybersecurity Resources Awarded

The first $1,000 Gordon Prize in Managing Cybersecurity Resources goes for an essay written by researchers from Harvard and Dresden, Germany. Maryland's Robert...

Tracking Devious Phishing Web Sites
From ACM TechNews

Tracking Devious Phishing Web Sites

Internet security experts have discovered that many phishers are using a trick called a flux, which allows a fake Web site to rapidly change its URL, making it...

From ACM TechNews

Field Experiment on a Metropolitan Quantum Cryptography Network

The University of Science and Technology of China recently demonstrated a metropolitan quantum cryptography network (QCN) for use by the government in Wuhu, China...

From ACM TechNews

Conference Focuses on Preventing High-Capacity Computer Data Theft

At the recent International Conference on Applied Modeling and Information Security Systems, high-performance computing researchers cautioned that worldwide computer...

From ACM News

Northeastern Launches Online Master's Degree Program in Information Security

Northeastern University is launching an online graduate degree program in information assurance (IA). The program, which will train students to tackle identity...

From ACM News

Eight-State Cyber Consortium Gets $2.7 Million Grant

The U.S. National Science Foundation has awarded a $2.7 million grant to an eight-state consortium of technology centers and community colleges that is working...

From ACM TechNews

­.s. Must Focus on Protecting Critical Computer Networks From Cyber Attack

A study from the RAND Corp. suggests the United States should focus on defending critical civilian and military computer networks from cyberattack, but does not...

From ACM TechNews

Prototype Security Software Blocks Ddos Attacks

Auburn University researchers have developed a software filter that protects computers against distributed denial-of-service (DDoS) attacks without bogging down...

Household Robots Do Not Protect ­sers' Security and Privacy
From ACM News

Household Robots Do Not Protect ­sers' Security and Privacy

People are increasingly using household robots for chores, communication, entertainment and companionship. But safety and privacy risks of information-gathering...

Terrorists Nearing Ability to Launch Big Cyberattacks Against ­.S.
From ACM TechNews

Terrorists Nearing Ability to Launch Big Cyberattacks Against ­.S.

U.S. computer networks are most threatened by terrorist organizations that may purchase software code from cybercrooks to hack into sensitive platforms, a possibility...

Networked Media: More Than Fun and Games
From ICT Results

Networked Media: More Than Fun and Games

Networked media means a lot to two different groups. To the billions of Web users worldwide, it is the stuff that makes the Web so great — the 3D games, the mobile...

Cybersecurity On Exhibit: Defending The ­.s. Online
From ACM News

Cybersecurity On Exhibit: Defending The ­.s. Online

A panel of officials says the United States is far behind in addressing cyber-security threats.  "Taking down the grid for months comes as close to a nuclear attack...

From ACM News

Threat of next world war may be in cyberspace: ­N

"Cyber war!" flashes on the screen at an Internet security conference. The next world war could take place in cyberspace, the UN telecommunications agency chief...

From ACM TechNews

New Digital Security Program Doesn't Protect as Promised

The Vanish security system has been broken by a team of researchers from the University of Texas at Austin, Princeton University, and the University of Michigan...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account