acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Web Means the End of Forgetting
From ACM News

The Web Means the End of Forgetting

Four years ago, Stacy Snyder, then a 25-year-old teacher in training at Conestoga Valley High School in Lancaster, Pa., posted a photo on her MySpace page that...

From ACM News

Working to Make Combat Soldiers' Lives Easier

In combat, things can be so chaotic and loud that soldiers sometimes aren't even aware they're being shot at.

From ACM News

New Cybersecurity Degree Program Designed to Fill Workforce Needs

The University of Maryland University College is reporting robust response to a first-of-its kind cybersecurity degree program scheduled to commence this fall.

Passwords that Are Simple
From ACM News

Passwords that Are Simple

Researchers at Microsoft have come up with a way to create easy-to-remember passwords without making a system more vulnerable to hackers.

From ACM TechNews

Some Experts Question Efforts to Identify Cyberattackers

Cybersecurity experts testifying at a recent U.S. House of Representatives subcommittee hearing disagreed about whether the federal government should explore new...

From ACM TechNews

Researchers ­nsheathe New Tool to Battle Botnets

University of Illinois at Urbana-Champaign researchers have developed a method to use a botnet's own technology to defeat it. 

From ACM News

Entering the Secret World of Wikileaks

The Website Wikileaks publishes secret documents submitted by anonymous sources and makes them available to the public. The site, which went public in January 2007...

Europe Overtakes Asia as Top Producer of Email Spam
From ACM News

Europe Overtakes Asia as Top Producer of Email Spam

Europe has overtaken Asia as the biggest source of email spam worldwide with Britain a major culprit, according to a new report by information technology security...

From ACM News

China Seeks to Reduce Internet Users' Anonymity

A leading Chinese Internet regulator has vowed to reduce anonymity in China's portion of cyberspace, calling for requirements that people use their real names when...

From ACM News

Feds Publish Final Ehealth 'meaningful Use' Rules

The U.S. Department of Health and Human Services (HHS) today issued the final guidelines that will determine how doctors, hospitals and other medical care facilities...

Sinister Take on Search Engine Optimization
From ACM TechNews

Sinister Take on Search Engine Optimization

Cybercriminals are increasingly using SEO to trick computer users into visiting malicious websites, according to security researchers. In one tactic, cybercriminals...

From ACM News

7887 Khz, Your Home For Classic Cuban Espionage Radio

The FBI documents that accompanied last week's arrest of 10 alleged Russian spies are alternately creepy—who knew the Tribeca Barnes & Noble was a hotbed of espionage...

From ACM News

Chinese Think Tank Accuses ­.S., Other Western Countries of ­sing Facebook to Sow ­nrest

A Chinese government-backed think tank has accused the U.S. and other Western governments of using social-networking sites such as Facebook to spur political unrest...

From ACM TechNews

Government Auditors Urge Clearer Cybersecurity R&D Strategy

The U.S. Government Accountability Office has released a report that criticizes the way in which the federal government funds and carries out cybersecurity research...

War in the Fifth Domain
From ACM TechNews

War in the Fifth Domain

The North Atlantic Treaty Organization's Estonia-based "center of excellence" for cyberdefense is the hub of brainstorming efforts covering the tactical and legal...

Why Face Recognition Isn't Scary
From ACM News

Why Face Recognition Isn't Scary

Most of the time, Stacey Schlittenhard finds facial recognition technology to be extremely useful. When she uploads her family photos to the Website Picasa, for...

Loophole May Have Aided Theft of Classified Data
From ACM News

Loophole May Have Aided Theft of Classified Data

The soldier accused of downloading a huge trove of secret data from military computers in Iraq appears to have exploited a loophole in Defense Department security...

From ACM News

­pdated Computer Security Publication Focuses on Security Assessment Plans

NIST has published an updated set of guidelines for developing security assessment plans and associated security control assessment procedures that are consistent...

From ACM News

Is Breaking Captcha a Crime?

Prosecutors in a New Jersey ticket scalping case are pushing the envelope on the federal computer hacking law, setting a precedent that could make it a felony to...

The Website That Reveals State Secrets
From ACM News

The Website That Reveals State Secrets

If Daniel Ellsberg wanted to leak secret documents today, he probably would send them to a powerful and controversial new venue for whistle-blowing: a Website called...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account