acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Real-Time Search
From ACM News

Real-Time Search

How do you parse a tweet? Five years ago, that question would have been gibberish. Today, it's perfectly sensible, and it's at the front of Amit Singhal's mind....

From ACM TechNews

Exposing Hackers as an International Deterrent

An international group of computer scientists, law professors, military leaders, and others recently met at Russia's Moscow State University for a conference on...

Keeping Medical Data Private
From ACM News

Keeping Medical Data Private

Researchers at Vanderbilt University have created an algorithm designed to protect the privacy of patients while maintaining researchers' ability to analyze vast...

Combing Medical Records For Research
From ACM News

Combing Medical Records For Research

When the stimulus bill passed last year--allocating $20 billion to help doctors and hospitals adopt electronic medical records (EMRs)--many scientists were excited...

Speedier Bug Catching
From ACM TechNews

Speedier Bug Catching

Engineers have developed new transistors that can locate hardware bugs in a fraction of the time it takes to perform normal debugging. 

Getting More from Location Data
From ACM News

Getting More from Location Data

Thanks to smart phones and other mobile devices, the number of applications that make use of geolocation data is exploding. But developers and device makers face...

From ACM TechNews

Stopping Stealthy Downloads

SRI International and Georgia Tech researchers have developed Block All Drive-By Download Exploits (BLADE), free software that can stop Internet attacks brought...

From ACM News

A Faster Wireless Web

Transfers of large amounts of data across the Internet to wireless devices suffer from a key problem: The Transmission Control Protocol (TCP) used to send and receive...

Wi-Fi at the Speed of Light
From ACM News

Wi-Fi at the Speed of Light

A wireless network that uses reflected infrared light instead of radio waves has transmitted data through the air at a speed of one gigabit per second—six to 14...

Searching For Disease Clues in Genetic Diversity
From ACM News

Searching For Disease Clues in Genetic Diversity

Over the last few years, scientists have discovered hundreds of genetic variants linked to disease. But the vast majority of that research has focused on people...

What's Inside the Ipad's Chip?
From ACM News

What's Inside the Ipad's Chip?

Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad. Jobs described the...

From ACM News

Trading Shares in Milliseconds

Today's stock market has become a world of automated transactions executed at lightning speed. This high-frequency trading could make the financial system more...

Self-Policing Cloud Computing
From ACM TechNews

Self-Policing Cloud Computing

Researchers at IBM Thomas J. Watson Research Center and IBM Research-Zurich have developed a cloud computing security system that makes elements of the cloud act...

Web Security Tool Copies Apps' Moves
From ACM TechNews

Web Security Tool Copies Apps' Moves

Scientists at Microsoft research have unveiled Ripley, a new way to secure complex Web applications by effectively cloning the user's browser and running it remotely...

From ACM TechNews

Software That Fixes Itself

Massachusetts Institute of Technology researchers led by professor Martin Rinard have developed ClearView, software capable of finding and fixing certain types...

From ACM TechNews

Eavesdropping on Smartphone Secrets

Security researchers at Cryptography Research say the smart card attack involving differential power analysis could be used to target smartphones. Cryptography...

From ACM TechNews

Vulnerability Seen in Amazon's Cloud-Computing

A new study by researchers from the Massachusetts Institute of Technology (MIT) and the University of California, San Diego (UCSD) suggests that leading cloud-computing...

Wireless Network Modded to See Through Walls
From ACM News

Wireless Network Modded to See Through Walls

The way signal strength varies in a wireless network can reveal what's going on behind closed doors. It's every schoolboy's dream: an easy way of looking through...

Making Android More Secure
From ACM TechNews

Making Android More Secure

Google developed a new approach to mobile phone security with its open source Android operating system. Android developer Rich Cannings says there must be a balance...

From ACM TechNews

How to Build Anonymity Into the Internet

At the 9th annual Privacy Enhancing Technologies Symposium, security researchers discussed alternatives to existing systems designed to help Internet users maintain...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account