acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Police Want Backdoor to Web Users' Private Data

count likely knows that police can peek inside it if they have a paper search warrant. But cybercrime investigators are frustrated by the speed of traditionalone...

From ACM News

U.S. Cyberwar Strategy: The Pentagon Plans to Attack

The China-U.S. diplomatic spat over cyberattacks on Google has highlighted the growing significance of the Internet as a theater of combat. Deputy Defense Secretary...

What's Inside the Ipad's Chip?
From ACM News

What's Inside the Ipad's Chip?

Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad. Jobs described the...

Firm Develops Technology to Crush Cyber Attacks in Their Tracks
From ACM News

Firm Develops Technology to Crush Cyber Attacks in Their Tracks

Cyber attacks are becoming the bane of governments and companies alike. A Virginia based engineering research company may have the answer. InZero Systems has developed...

From ACM News

Trail of Iowa Computer Hack Points to China

Iowa investigators suspect a serious breach of a state government computer database last week originated in China. The hackers gained access to a computer system...

From ACM News

Acacia: The Company Tech Loves to Hate

For a company that makes no products, Acacia Research spends a lot of time fighting over patents in court. Acacia has filed at least 337 patent-related lawsuits...

From ACM News

Google Attack Highlights 'zero-Day' Black Market

The recent hacking attack that prompted Google's threat to leave China is underscoring the heightened dangers of previously undisclosed computer security flaws...

Hacking For Fun and Profit in China's Underworld
From ACM News

Hacking For Fun and Profit in China's Underworld

With a few quick keystrokes, a computer hacker who goes by the code name Majia calls up a screen displaying his latest victims. He operates secretly and illegally...

The Uncertain Future For Social Robots
From ACM News

The Uncertain Future For Social Robots

Being hacked by a robot requires much less hardware than I expected. There’s no need for virtual-reality goggles or 3D holograms. There are no skullcaps studded...

Signing Contracts on the Telephone
From ACM TechNews

Signing Contracts on the Telephone

The Fraunhofer Institute for Secure Information Technology (SIT) in Germany has developed VoIPS, software that prevents the tampering and manipulation of telephone...

From ACM News

U.k. Report on Chinese Spying 'unsubstantiated'

A Chinese military expert Sunday (January 31) refuted claims by the U.K.'s national security intelligence agency that China has engaged in commercial espionage,...

Smart Dust? Not Quite, but We
From ACM News

Smart Dust? Not Quite, but We

In computing, the vision always precedes the reality by a decade or more. The pattern has held true from the personal computer to the Internet, as it takes time...

China's Cyber War on the ­nited States
From ACM News

China's Cyber War on the ­nited States

In the U.S. Naval Network Warfare Command, the largest threats against U.S. computer networks originate from Chinese hackers. According to a report from Federal...

Parallel Algorithm Leads to Cryptography Breakthrough
From ACM News

Parallel Algorithm Leads to Cryptography Breakthrough

Pico Computing announced that it has achieved the highest-known benchmark speeds for 56-bit DES decryption, with reported throughput of over 280 billion keys per...

Researchers Criticize 3D Secure Credit Card Authentication
From ACM TechNews

Researchers Criticize 3D Secure Credit Card Authentication

University of Cambridge Computer Laboratory researchers Steven J. Murdoch and Ross Anderson contend in a paper that the 3D Secure credit card authentication system...

From ACM News

Eff Reveals How Your Digital Fingerprint Makes You Easy to Track

Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again. The Electronic Frontier Foundation (EFF) has launched...

From ACM News

Innovative Technique Can Spot Errors in Key Technological Systems

An innovative computational technique that draws on statistics, imaging, and other disciplines has the capability to detect errors in sensitive technological systems...

Report Reveals Critical Infrastructure ­nder Constant Cyber Attack
From ACM News

Report Reveals Critical Infrastructure ­nder Constant Cyber Attack

The staggering cost and impact of cyber attacks on critical infrastructure such as electrical grids, oil and gas production, telecommunications and transportation...

To Beat Spam, Turn Its Own Weapons Against It
From ACM TechNews

To Beat Spam, Turn Its Own Weapons Against It

Researchers from the International Computer Science Institute and the University of California, San Diego have developed a method for blocking the most common type...

From ACM News

U.s. Businesses Face Increasing Threats From Chinese Cyber Attacks

U.S. businesses and government agencies are facing increasing risks of potential cyber attacks from China, according to a recent report. And IT departments that...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account