acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Wanted: Young Cyberexperts to Defend Internet

The federal government, education officials and giant military contractors are collaborating to recruit a new class of tech professional specifically trained...

From ACM TechNews

Why Can't Johnny Develop Secure Software?

Despite a wealth of security knowledge and developers' access to advanced tools, many software security risks remain. Analysts say that many software developers...

From ACM News

Kaminsky Issues Developer Tool To Kill Injection Bugs

Renowned security researcher Dan Kaminsky today went public with the launch of a new venture as well as its first deliverable--a tool for application developers...

Cyber-War a Growing Threat Warn Experts
From ACM News

Cyber-War a Growing Threat Warn Experts

In 2007, Estonia was the subject of a series of cyber attacks which crippled the Internet across the country. Banks, government departments and the national media...

10 R&d Cybersecurity Initiatives Congress Seeks
From ACM TechNews

10 R&d Cybersecurity Initiatives Congress Seeks

The Protecting Cyberspace as a National Asset Act of 2010, which was recently introduced in the U.S. Senate, lists 10 R&D initiatives the government would support...

From ACM TechNews

Get Smart: Targeting Phone Security Flaws

Data from the National Vulnerability Database shows that last year security experts identified 30 security flaws in the software and operating systems of smartphones...

From ACM News

Technology Milestone Heralds a More Secure Internet

Moves to make the web's address system more secure will take a major step forward next month. In the planning for a decade, the Domain Name System Security Extentions...

From ACM News

Computing with Secrets, but Keeping them Safe

A novel technique could see future Web services work with sensitive data without ever being able to read it. Several implementations of a mathematical proof unveiled...

Pentagon Manhunt
From ACM News

Pentagon Manhunt

Pentagon investigators are trying to determine the whereabouts of the Australian-born founder of the secretive website Wikileaks for fear that he may be about to...

From ACM TechNews

Protecting Privacy: Make the Data 'fade Away'

Personal information can be protected by having it gradually fade away over time,  says the University of Twente's Harold van Heerde, whose dissertation shows that...

From ACM News

No Secrets

Julian Assange’s mission for total transparency.

From ACM TechNews

Panel to Recommend Certifications for Cybersecurity Workforce

The U.S. Commission on Cybersecurity for the 44th Presidency is finalizing a draft report that discusses ways to expand the U.S. government's cybersecurity workforce...

From ACM News

Cyber War: Microsoft a Weak Link in National Security

"Microsoft has vast resources, literally billions of dollars in cash, or liquid assets reserves. Microsoft is an incredibly successful empire built on the premise...

New Cyber Chief Outlines Strategy
From ACM News

New Cyber Chief Outlines Strategy

Security experts said this week that they were cheered by calls from General Keith Alexander, head of the new U.S. Cyber Command, for global rules of engagement...

How to Cope When the World Can Watch Everything You Do
From ACM News

How to Cope When the World Can Watch Everything You Do

In 1968, pop artist Andy Warhol declared that in the future everyone will be world famous for 15 minutes. As with many other predictions, it has not quite turned...

Virtual Privacy
From ACM TechNews

Virtual Privacy

Northeastern University professor Alan Mislove, whose research focuses on how people interact in the virtual world, says that many patterns of human interaction...

Archive Project Will Digitize Wwii Enigma Messages
From ACM TechNews

Archive Project Will Digitize Wwii Enigma Messages

British historians have launched a project to digitize messages intercepted from Germany's Enigma machine during World War II. The encrypted messages were decoded...

Researchers: Poor Password Practices Hurt Security for All
From ACM TechNews

Researchers: Poor Password Practices Hurt Security for All

University of Cambridge researchers recently completed a large study of password-protected Web sites and found that a lack of industry standards harms end-user...

China Issues White Paper on Internet Policy
From ACM News

China Issues White Paper on Internet Policy

The Chinese government Tuesday published a white paper on its Internet policy, stressing the guarantee of citizens' freedom of speech on the Internet and more intensive...

From ACM News

Isaca Identifies Top Five Social Media Risks For Business

An ISACA white paper names the top five social media risks for businesses and recommends solutions to help address the security, customer service and corporate...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account