acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Researchers Find Weakness in Common Digital Security System
From ACM News

Researchers Find Weakness in Common Digital Security System

The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer...

From ACM TechNews

U.s. Plan to Make Hacking Harder Revealed

The Obama administration has declassified part of its plan to improve the security of cyberspace in an attempt to cultivate greater collaboration between government...

From ACM TechNews

Attack Unmasks User Behind the Browser

Vienna University of Technology researchers have developed the "deanonymization" attack as a way to reveal the identity of Internet users based on their interactions...

Scientists Strive to Map the Shape-Shifting Net
From ACM News

Scientists Strive to Map the Shape-Shifting Net

In a dimly lit chamber festooned with wires and hidden in one of California’s largest data centers, Tim Pozar is changing the shape of the Internet. He is using...

The Interpreter in the Laptop
From ACM TechNews

The Interpreter in the Laptop

Karlsruhe Institute of Technology scientists will demonstrate a language-to-language translation device at the upcoming CeBIT conference. The device combines automatic...

From ACM News

Guide For Applying Risk Management Framework to Information Systems Released

The final publication of the 93-page Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach (NIST Special...

Ornl Technology May Better Detect Cyber Security Attacks
From ACM News

Ornl Technology May Better Detect Cyber Security Attacks

A system that can more effectively detect possible cyber security attacks within large organizations—including government agencies—is being developed with the assistance...

Security Key to Unlocking Cloud Potential
From ACM News

Security Key to Unlocking Cloud Potential

The issue of security is holding back its full potential of cloud computing. This was the gist of the keynote message presented Tuesday (March 2) by Art Coviello...

From ACM News

Study: Google-China Attack Driven by Amateurs

The computer attack which led Google to threaten leaving China and created a firestorm between Washington and Beijing appears to have been deployed by amateurs,...

Sat-Nav Systems ­nder Growing Threat from 'jammers'
From ACM News

Sat-Nav Systems ­nder Growing Threat from 'jammers'

Technology that depends on satellite-navigation signals is increasingly threatened by attack from widely available equipment, experts say. While "jamming" sat-nav...

Experts Warn of Catastrophe From Cyberattacks
From ACM TechNews

Experts Warn of Catastrophe From Cyberattacks

A panel of experts told U.S. senators at a recent hearing of the Senate Committee on Commerce, Science, and Transportation that the United States would be defeated...

From ACM TechNews

Stopping Stealthy Downloads

SRI International and Georgia Tech researchers have developed Block All Drive-By Download Exploits (BLADE), free software that can stop Internet attacks brought...

Tracking Garbage
From Communications of the ACM

Tracking Garbage

Researchers are focusing on the so-called "removal chain" in an attempt to save landfill space, improve recycling rates, and trim the flow of toxic materials into...

Engineering the Web's Third Decade
From Communications of the ACM

Engineering the Web's Third Decade

As Web technologies move beyond two-way interactive capabilities to facilitate more dynamic and pervasive experiences, the Web is quickly advancing toward its third...

CS and Biology's Growing Pains
From Communications of the ACM

CS and Biology's Growing Pains

Biologists can benefit from learning and using the tools of computer science, but several real-world obstacles remain.

In Networks We Trust
From ICT Results

In Networks We Trust

European researchers are proposing a paradigm-shifting solution to trusted computing that offers better security and authentication with none of the drawbacks that...

Computer Scientist To Address Congress on Privacy Issues and Location-Based Services
From ACM News

Computer Scientist To Address Congress on Privacy Issues and Location-Based Services

Carnegie Mellon University's Lorrie F. Cranor will discuss the risk and benefits of online services that collect and use location information to joint meetings...

Truly Random Numbers
From ACM TechNews

Truly Random Numbers

German researchers have developed a random number generator that uses a computer memory element, a flip-flop, to create an extra layer of randomness. 

Battling Zombies, Botnets and Torpig
From ACM TechNews

Battling Zombies, Botnets and Torpig

University of Calgary (UC) researchers are developing a range of technologies to prevent and detect cyberattacks and botnets. "It's an issue of scale," says UC...

­sb Fingerprints Identify 'pod Slurping' Data Thieves
From ACM TechNews

­sb Fingerprints Identify 'pod Slurping' Data Thieves

Intellectual property thieves who engage in so-called pod-slurping attacks leave a "USB fingerprint," according to Vasilios Katos and Theodoros Kavallaris of the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account