acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectComputer Systems
authorReuters
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


China Draft Counterterror Law Strikes Fear in Foreign Tech Firms
From ACM Careers

China Draft Counterterror Law Strikes Fear in Foreign Tech Firms

China is weighing a far-reaching counterterrorism law that would require technology firms to hand over encryption keys and install security "backdoors", a potential...

China's Internet Population Hits 649 Million, 86 Percent on Phones
From ACM News

China's Internet Population Hits 649 Million, 86 Percent on Phones

China had 649 million Internet users by the end of 2014, with 557 million of those using handsets to go online, said a government report on Tuesday, as the world's...

Downing North Korea's Internet Not Much of a Scalp
From ACM News

Downing North Korea's Internet Not Much of a Scalp

If someone did just knock North Korea off the Internet for half a day, it wouldn't have taken much.

At China Online Coming-Out Party, Beijing Spells Out Internet Control Ambition
From ACM News

At China Online Coming-Out Party, Beijing Spells Out Internet Control Ambition

China showed governments and the planet's biggest tech firms last week its vision for global Internet governance—clean, controlled and choreographed.

­.s. Government Probes Medical Devices For Possible Cyber Flaws
From ACM News

­.s. Government Probes Medical Devices For Possible Cyber Flaws

The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that...

­.s. National Security Prosecutors Shift Focus from Spies to Cyber
From ACM News

­.s. National Security Prosecutors Shift Focus from Spies to Cyber

The U.S. Justice Department is restructuring its national security prosecution team to deal with cyber attacks and the threat of sensitive technology ending up...

New Smartphone App Gives Sight to the Blind
From ACM Careers

New Smartphone App Gives Sight to the Blind

Jonathan Mosen, who has been blind since birth, spent his evening snapping photos of packages in the mail, his son's school report and labels on bottles in the...

Nsa Chief on Tech-Savvy Islamic State: 'i'm Watching'
From ACM Opinion

Nsa Chief on Tech-Savvy Islamic State: 'i'm Watching'

While U.S. military leaders appeared before Congress to outline their strategy to fight Islamic State militants on the battlefield, the National Security Agency...

Cars that Drive Themselves Starting to Chat with Each Other
From ACM News

Cars that Drive Themselves Starting to Chat with Each Other

An Acura RLX sedan demonstrated an unusual way to tow another car this week: the vehicles were not physically attached.

Nato Agrees Cyber Attack Could Trigger Military Response
From ACM News

Nato Agrees Cyber Attack Could Trigger Military Response

NATO leaders agreed on Friday that a large-scale cyber attack on a member country could be considered an attack on the entire U.S.-led alliance, potentially triggering...

China Targets Own Operating System to Take on Likes of Microsoft, Google
From ACM News

China Targets Own Operating System to Take on Likes of Microsoft, Google

China could have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said...

Hacker Says to Show Passenger Jets at Risk of Cyber Attack
From ACM News

Hacker Says to Show Passenger Jets at Risk of Cyber Attack

Cyber security researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their WiFi and inflight...

Mastercard Expects Big Growth from 'big Data' Insights
From ACM Careers

Mastercard Expects Big Growth from 'big Data' Insights

MasterCard Inc, the world's second-largest debit and credit card company, sees business booming from selling data to retailers, banks, and governments on spending...

­.s. Companies Seek Cyber Experts For Top Jobs, Board Seats
From ACM Careers

­.s. Companies Seek Cyber Experts For Top Jobs, Board Seats

Some of the largest U.S. companies are looking to hire cybersecurity experts in newly elevated positions and bring technologists on to their boards, a sign that...

Nsa Infiltrated Rsa Security More Deeply Than Thought  Study
From ACM News

Nsa Infiltrated Rsa Security More Deeply Than Thought Study

Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's...

DDoS Cyber Attacks Get Bigger, Smarter, More Damaging
From ACM News

DDoS Cyber Attacks Get Bigger, Smarter, More Damaging

Crashing websites and overwhelming data centers, a new generation of cyber attacks is costing millions and straining the structure of the Internet.

Telecom Firms Mine For Gold in Big Data Despite Privacy Concerns
From ACM News

Telecom Firms Mine For Gold in Big Data Despite Privacy Concerns

Last year's revelations over the U.S. tapping of phone and internet data gave telecoms firms pause for thought over whether they should sell their "big data" for...

Fbi Warns Retailers to Expect More Credit Card Breaches
From ACM News

Fbi Warns Retailers to Expect More Credit Card Breaches

The FBI has warned U.S. retailers to prepare for more cyber attacks after discovering about 20 hacking cases in the past year that involved the same kind of malicious...

Supreme Court to Decide on Patent Protections For Software
From ACM News

Supreme Court to Decide on Patent Protections For Software

The Supreme Court agreed last Friday to rule on the divisive issue of what kinds of software are eligible for patent protection in a case being closely watched...

Wall Street Banks Learn How to Survive in Staged Cyber Attack
From ACM News

Wall Street Banks Learn How to Survive in Staged Cyber Attack

In a staged simulation called Quantum Dawn 2, bank executives in charge of operations, technology, and crisis planning were tasked with detecting how a massive...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account