acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectLegal Aspects
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Banks Seek Nsa Help Amid Attacks on Their Computer Systems
From ACM News

Banks Seek Nsa Help Amid Attacks on Their Computer Systems

Major U.S. banks have turned to the National Security Agency for help protecting their computer systems after a barrage of assaults that have disrupted their Web...

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive
From ACM News

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive

Some of the most important clues about what drove Adam Lanza to mass murder probably sit on the computer that the reclusive, technical-minded 20-year-old used as...

In South Korea, the Republic of Samsung
From ACM Careers

In South Korea, the Republic of Samsung

So sprawling is Samsung’s modern-day empire that some South Koreans say it has become possible to live a Samsung-only life: You can use a Samsung credit card to...

Hacker Locates John Mcafee Through Smartphone Tracks
From ACM News

Hacker Locates John Mcafee Through Smartphone Tracks

Weeks of international intrigue about the whereabouts of tech millionaire John McAfee ended Tuesday after the Internet pioneer made an elementary digital mistake...

Web Monitor: 100 Percent of Syria's Internet Just Shut Down
From ACM News

Web Monitor: 100 Percent of Syria's Internet Just Shut Down

It appears that the Syrian government may have just taken a drastic measure it has conspicuously avoided over the nearly two years of fighting: cutting itself off...

From ACM News

When Is a Cyberattack an Act of War?

On the night of Oct. 11, Defense Secretary Leon Panetta stood inside the Intrepid Sea, Air and Space Museum, housed in a former aircraft carrier moored at a New...

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems
From ACM News

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems

The emails arrived like poison darts from cyberspace.

From ACM News

Google's Restricting of Anti-Muslim Video Shows Role of Web Firms As Free-Speech Arbiters

Google lists eight reasons on its "YouTube Community Guidelines" page for why it might take down a video. Inciting riots is not among them.

Gps Technology Finding Its Way Into Court
From ACM News

Gps Technology Finding Its Way Into Court

The rapid spread of cellphones with GPS technology has allowed police to track suspects with unprecedented precision—even as they commit crimes. But the legal fight...

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks
From ACM News

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks

John Sublett and his colleagues had an audacious, digital-age plan. They wanted to use the Internet to enable businesses to manage any kind of electronic device...

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say
From ACM News

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed...

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks
From ACM News

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks

It began as a hobby for a ­teenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet.

Law Allows Creationism to Be Taught in Tenn. Public Schools
From ACM News

Law Allows Creationism to Be Taught in Tenn. Public Schools

A bill that allows Tennessee public school teachers to teach alternatives to mainstream scientific theories, such as evolution, will become law this month after...

From ACM News

U.s. Accelerating Cyberweapon Research

The Pentagon is accelerating efforts to develop a new generation of cyberweapons capable of disrupting enemy military networks even when those networks are not...

From ACM News

What Should Apple Do with Its Cash?

Apple's soaring with the market Tuesday, topping $530 per share. Not only is Apple soaring in the stock market, the company is also sitting on $98 billion in cash—a...

Google ­nified Privacy Settings ­nsettle ­sers
From ACM News

Google ­nified Privacy Settings ­nsettle ­sers

Google, I wish I knew how to quit you.

From ACM News

'do Not Track' Button

Alongside the news that the White House will announce voluntary privacy guidelines for Web companies comes the announcement from major online advertisers that they...

From ACM News

Facebook Ipo: How Does Facebook Make Its Money?

Facebook's IPO filing shows that the company brought in about $3.7 billion in revenue and made $1 billion in profit in 2011.

From ACM News

The Search For the Right Candidate Just Got More Personal

The 2012 presidential campaign is about to get a lot more personal, at least if Google has any say in it.

Rise of the Drone: From Calif. Garage to Multibillion-Dollar Defense Industry
From ACM News

Rise of the Drone: From Calif. Garage to Multibillion-Dollar Defense Industry

In 1980, Abraham Karem, an engineer who had emigrated from Israel, retreated into his three-car garage in Hacienda Heights outside Los Angeles and, to the bemusement...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account