acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Google Offers Peek at Operating System, a Potential Challenge to Windows

MOUNTAIN VIEW, Calif. — Google began lifting the veil on its planned Chrome operating system on Thursday, but it said that computers powered by the software would...

Self-Policing Cloud Computing
From ACM TechNews

Self-Policing Cloud Computing

Researchers at IBM Thomas J. Watson Research Center and IBM Research-Zurich have developed a cloud computing security system that makes elements of the cloud act...

Are Nations Paying Criminals for Botnet Attacks?
From ACM TechNews

Are Nations Paying Criminals for Botnet Attacks?

Countries that want to disrupt other nations' government, banking, and media resources can simply hire cybercriminals to launch botnet attacks, according to new...

Trust Linux!
From ICT Results

Trust Linux!

A team of researchers has implemented support for 'trusted computing' in a commercially available version of the open source operating system Linux, breaking new...

Certification and Accreditation Process For Federal Systems Transformed
From ACM News

Certification and Accreditation Process For Federal Systems Transformed

A revised draft publication on computer security guidance issued by the National Institute of Standards and Technology (NIST) is focused on transforming the episodic...

Mobile Botnets Show Their Destructive Potential
From ACM News

Mobile Botnets Show Their Destructive Potential

Denial-of-services (DoS) attacks are a common tactic used by "black hats" intent on bringing down a high-profile Web site. Now Patrick Traynor of the Georgia Institute...

From ACM News

Researchers Develop Anti-Counterfeiting Technology For Rfid Tags

Engineering researchers at the University of Arkansas have developed a unique and robust method to prevent cloning of passive radio frequency identification (RFID)...

Facebook Offers Poor Personal Data Protection
From ACM TechNews

Facebook Offers Poor Personal Data Protection

A study of Norwegian Internet users and social media found that people are willing to post their personal information on social media sites even when they are not...

Georgia Tech Launches Experimental Green It Initiative
From ACM News

Georgia Tech Launches Experimental Green It Initiative

The biggest challenge in computing today, some experts say, is not processing power, but power consumption. To help understand and reduce power consumption, the...

Improving Security With Face Recognition Technology
From ACM TechNews

Improving Security With Face Recognition Technology

University of Miami professor Mohamed Abdel-Mottaleb has developed a new way to improve the efficiency and accuracy of facial recognition technology. Abdel-Mottaleb...

From ACM News

Face-Recognition Technology May Be ­sed at Hong Kong Border Checks

Face-recognition technology might be used to screen the residents at Hong Kong border checkpoints, Hong Kong's Security Secretary Ambrose Lee said Thursday (Nov...

From ACM News

Secret Math of Fly Eyes Could Overhaul Robot Vision

By turning the brain cell activity underlying fly eyesight into mathematical equations, researchers have found an ultra-efficient method for pulling motion patterns...

From ACM News

Wi-Fi Certification Might Be Tweaked For Smart Grids

The Wi-Fi Alliance has formed a task group to determine what standards need to be modified to ensure Wi-Fi is the tool of choice for smart-grid applications. The...

What Happens When Good Robots Go 'bad'?
From ACM TechNews

What Happens When Good Robots Go 'bad'?

A study by University of Washington researchers led by doctoral student Tamara Denning calls attention to the possibility of household robots being hacked by malevolent...

Web Security Tool Copies Apps' Moves
From ACM TechNews

Web Security Tool Copies Apps' Moves

Scientists at Microsoft research have unveiled Ripley, a new way to secure complex Web applications by effectively cloning the user's browser and running it remotely...

From ACM News

Terrorism in the Age of Technology: Biothreats And?cyber Warfare

While once considered unconventional, cyber attacks and biological warfare have become an increasing threat to security and a tactic of rising concern. Spanning...

Rutgers Computer Scientists Work to Strengthen Online Security
From ACM TechNews

Rutgers Computer Scientists Work to Strengthen Online Security

Rutgers University computer scientists are developing an alternative to online security questions that is designed to be easier for legitimate users and more secure...

Grant Will Improve Mobile Device, Cellular Network Security
From ACM News

Grant Will Improve Mobile Device, Cellular Network Security

Smart phones have become indispensable to today's highly mobile workforce and tech-savvy youngsters, but they pose new security and privacy risks. Two assistant...

Is Aes Encryption Crackable?
From ACM TechNews

Is Aes Encryption Crackable?

The Advanced Encryption Standard (AES) system was long believed to be invulnerable to attack, but a group of researchers recently demonstrated that there may be...

The Explainer: P vs. Np
From ACM TechNews

The Explainer: P vs. Np

The Clay Mathematics Institute has a standing offer of $1 million for anyone who is able to prove or disprove one of seven problems that have never been solved....
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account