acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

The Hunt For the Wikileaks Whistle-Blower

Attorney General Eric Holder's new probe into Wikileaks's posting of 91,000 war documents will likely find that tracing the path of the documents back through the...

From ACM TechNews

Group Devises New Method For Securing Location-Sensitive Data

UCLA computer scientists have shown that cryptography based solely on physical location is possible by using quantum mechanics.  The method enables users to encrypt...

Defcon Ninja Party Badge
From ACM News

Defcon Ninja Party Badge

A hacker group known as the Ninjas has created what may be the best DefCon badge ever. The badge allows wireless ninja battle between badge holders. Unlike the...

From ACM News

So Many Bugs, So Little Time

Tools that find serious bugs automatically could lead to safer, more stable software.

From ACM News

The Technical Muscle Behind Wikileaks

WikiLeaks isn't much to look at. The Website's homepage is largely composed of a plain-text logo and a giant hyperlink that simply says: "Submit documents."

Wikileaks: Hard Facts and a Hacker Ethos
From ACM News

Wikileaks: Hard Facts and a Hacker Ethos

Julian Assange has been hailed as a hero of investigative journalism and condemned as a risk to national security. Wikileaks, the site of which he is director,...

Social Web: The Great Tipping Point Test
From ACM News

Social Web: The Great Tipping Point Test

Every move you make, every twitter feed you update, somebody is watching you. You may not think twice about it, but if you use a social networking site, a cellphone...

Celebrating the Legacy of Plato
From Communications of the ACM

Celebrating the Legacy of Plato

The PLATO@50 Conference marked the semicentennial of the computer system that was the forerunner of today's social media and interactive education.

Making Sense of Real-Time Behavior
From Communications of the ACM

Making Sense of Real-Time Behavior

Data captured by sensors worn on the human body and analyzed in near real-time could transform our understanding of human behavior, health, and society.

From ACM News

Hackers With Enigmatic Motives Vex Companies

The world of hackers can be roughly divided into three groups. "Black hats" break into corporate computer systems for fun and profit, taking credit card numbers...

Scientists Take Aim at Website Hackers
From ACM News

Scientists Take Aim at Website Hackers

With support from the U.S. National Science Foundation, a team of computer scientists is using a novel, two-pronged approach to protect websites from hackers.

The Web Means the End of Forgetting
From ACM News

The Web Means the End of Forgetting

Four years ago, Stacy Snyder, then a 25-year-old teacher in training at Conestoga Valley High School in Lancaster, Pa., posted a photo on her MySpace page that...

From ACM News

Working to Make Combat Soldiers' Lives Easier

In combat, things can be so chaotic and loud that soldiers sometimes aren't even aware they're being shot at.

From ACM News

New Cybersecurity Degree Program Designed to Fill Workforce Needs

The University of Maryland University College is reporting robust response to a first-of-its kind cybersecurity degree program scheduled to commence this fall.

Passwords that Are Simple
From ACM News

Passwords that Are Simple

Researchers at Microsoft have come up with a way to create easy-to-remember passwords without making a system more vulnerable to hackers.

From ACM TechNews

Some Experts Question Efforts to Identify Cyberattackers

Cybersecurity experts testifying at a recent U.S. House of Representatives subcommittee hearing disagreed about whether the federal government should explore new...

From ACM TechNews

Researchers ­nsheathe New Tool to Battle Botnets

University of Illinois at Urbana-Champaign researchers have developed a method to use a botnet's own technology to defeat it. 

From ACM News

Entering the Secret World of Wikileaks

The Website Wikileaks publishes secret documents submitted by anonymous sources and makes them available to the public. The site, which went public in January 2007...

Europe Overtakes Asia as Top Producer of Email Spam
From ACM News

Europe Overtakes Asia as Top Producer of Email Spam

Europe has overtaken Asia as the biggest source of email spam worldwide with Britain a major culprit, according to a new report by information technology security...

From ACM News

China Seeks to Reduce Internet Users' Anonymity

A leading Chinese Internet regulator has vowed to reduce anonymity in China's portion of cyberspace, calling for requirements that people use their real names when...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account