acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Message From Rim Chief: Monitoring Would Kill Web
From ACM News

Message From Rim Chief: Monitoring Would Kill Web

Research In Motion Ltd. co-CEO Michael Lazaridis lashed out at governments seeking to ban his company's BlackBerry phones, saying they risk undermining the growth...

Web Attack Knows Where You Live
From ACM News

Web Attack Knows Where You Live

One visit to a booby-trapped Web site could direct attackers to a person's home, a security expert has shown.

Hacking the Smart Grid
From ACM News

Hacking the Smart Grid

The hurried deployment of smart-grid technology could leave critical infrastructure and private homes vulnerable to hackers. Security experts at the Black Hat...

For E-Data, Tug Grows Over Privacy vs. Security
From ACM News

For E-Data, Tug Grows Over Privacy vs. Security

 The threat by the United Arab Emirates to shut down mobile services on BlackBerrys like email and text messaging underscores a growing tension between communications...

From ACM News

WikiLeaks Posts Mysterious 'Insurance' File

In the wake of strong U.S. government statements condemning WikiLeaks' recent publishing of 77,000 Afghan War documents, the secret-spilling site has posted a mysterious...

In Silicon Valley, Forget Your Wallet
From ACM News

In Silicon Valley, Forget Your Wallet

Two pilot programs by start-ups in Silicon Valley are testing ways to bring to market a long-promised innovation of the Internet era: the digital wallet.

The Agnostic Cartographer
From ACM News

The Agnostic Cartographer

How Google’s open-ended maps are embroiling the company in some of the world’s touchiest geopolitical disputes.

­.s. Military Cyberwar: What's Off-Limits?
From ACM News

­.s. Military Cyberwar: What's Off-Limits?

The United States should decide on rules for attacking other nations' networks in advance of an actual cyberwar, which could include an international agreement...

Commerce Seeks Industry Comment on Ways to Bolster Cybersecurity
From ACM TechNews

Commerce Seeks Industry Comment on Ways to Bolster Cybersecurity

The U.S. Commerce Department's Internet Policy Task Force is seeking comments from the private sector and academia about the cybersecurity challenges they face...

From ACM News

White House Proposal Would Ease Fbi Access to Records of Internet Activity

The Obama administration is seeking to make it easier for the FBI to compel companies to turn over records of an individual's Internet activity without a court...

From ACM News

The Hunt For the Wikileaks Whistle-Blower

Attorney General Eric Holder's new probe into Wikileaks's posting of 91,000 war documents will likely find that tracing the path of the documents back through the...

From ACM TechNews

Group Devises New Method For Securing Location-Sensitive Data

UCLA computer scientists have shown that cryptography based solely on physical location is possible by using quantum mechanics.  The method enables users to encrypt...

Defcon Ninja Party Badge
From ACM News

Defcon Ninja Party Badge

A hacker group known as the Ninjas has created what may be the best DefCon badge ever. The badge allows wireless ninja battle between badge holders. Unlike the...

From ACM News

So Many Bugs, So Little Time

Tools that find serious bugs automatically could lead to safer, more stable software.

From ACM News

The Technical Muscle Behind Wikileaks

WikiLeaks isn't much to look at. The Website's homepage is largely composed of a plain-text logo and a giant hyperlink that simply says: "Submit documents."

Wikileaks: Hard Facts and a Hacker Ethos
From ACM News

Wikileaks: Hard Facts and a Hacker Ethos

Julian Assange has been hailed as a hero of investigative journalism and condemned as a risk to national security. Wikileaks, the site of which he is director,...

Social Web: The Great Tipping Point Test
From ACM News

Social Web: The Great Tipping Point Test

Every move you make, every twitter feed you update, somebody is watching you. You may not think twice about it, but if you use a social networking site, a cellphone...

Celebrating the Legacy of Plato
From Communications of the ACM

Celebrating the Legacy of Plato

The PLATO@50 Conference marked the semicentennial of the computer system that was the forerunner of today's social media and interactive education.

Making Sense of Real-Time Behavior
From Communications of the ACM

Making Sense of Real-Time Behavior

Data captured by sensors worn on the human body and analyzed in near real-time could transform our understanding of human behavior, health, and society.

From ACM News

Hackers With Enigmatic Motives Vex Companies

The world of hackers can be roughly divided into three groups. "Black hats" break into corporate computer systems for fun and profit, taking credit card numbers...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account