acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Security Chip That Does Encryption in Pcs Hacked
From ACM TechNews

Security Chip That Does Encryption in Pcs Hacked

Security consultant Christopher Tarnovsky recently discovered a way to break chips that carry a Trusted Platform Module (TPM) designation by essentially spying...

From ACM TechNews

'Rugged' Initiative Brings Secure Software Development to the Masses

The Rugged Software Development Initiative (RSDI) was recently launched by security experts in an effort to ensure that the software writing process considers security...

Searching For Disease Clues in Genetic Diversity
From ACM News

Searching For Disease Clues in Genetic Diversity

Over the last few years, scientists have discovered hundreds of genetic variants linked to disease. But the vast majority of that research has focused on people...

Unplugged: Goodbye Cables, Hello Energy Beams
From ACM News

Unplugged: Goodbye Cables, Hello Energy Beams

LET'S face it: power cables are unsightly dust-traps. PCs, TVs and music players are becoming slicker every year, but the nest of vipers in the corner of everyAn...

From ACM TechNews

Google to Enlist Nsa to Help It Ward Off Cyberattacks

Google and the U.S. National Security Agency (NSA) are collaborating to fortify defenses against future cyberattacks. NSA will assist Google in studying an assault...

From ACM TechNews

Code Defends Against 'stealthy' Computer Worms

Pennsylvania State University researchers have developed an algorithm that defends against the spread of local scanning worms that search for hosts in "local" spaces...

Darpa's New Plans: Crowdsource Intel, Edit Dna
From ACM TechNews

Darpa's New Plans: Crowdsource Intel, Edit Dna

The U.S. Defense Advanced Research Projects Agency's (DARPA's) future plans call for crowdsourcing military intelligence, creating an immune system for Defense...

From ACM News

­.s. Scientists Given Access to Cloud Computing

The National Science Foundation and the Microsoft Corporation have agreed to offer American scientific researchers free access to the company’s new cloud computing...

­.s. House Passes Bill to Bolster Cybersecurity
From ACM News

­.s. House Passes Bill to Bolster Cybersecurity

The U.S. House of Representatives on Thursday (February 4) overwhelmingly approved a bill aimed at protecting the Internet and vulnerable computer networks by funding...

From ACM News

De-Worming Software More Effective at Detecting Infected Network Computers Before Contagion Can Spread

More than a year after being launched by hackers on a campaign to infect computers running Microsoft Windows, the Conficker worm's effects are still being felt....

Data Defenders
From ACM TechNews

Data Defenders

University of California, Irvine researchers are developing new cybersecurity methods designed to thwart botnets and other types of cyberattacks. 

From ACM News

Google to Enlist NSA to Help It Ward Off Cyberattacks

The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity. Under...

From ACM News

Police Want Backdoor to Web Users' Private Data

count likely knows that police can peek inside it if they have a paper search warrant. But cybercrime investigators are frustrated by the speed of traditionalone...

From ACM News

U.S. Cyberwar Strategy: The Pentagon Plans to Attack

The China-U.S. diplomatic spat over cyberattacks on Google has highlighted the growing significance of the Internet as a theater of combat. Deputy Defense Secretary...

What's Inside the Ipad's Chip?
From ACM News

What's Inside the Ipad's Chip?

Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad. Jobs described the...

Firm Develops Technology to Crush Cyber Attacks in Their Tracks
From ACM News

Firm Develops Technology to Crush Cyber Attacks in Their Tracks

Cyber attacks are becoming the bane of governments and companies alike. A Virginia based engineering research company may have the answer. InZero Systems has developed...

From ACM News

Trail of Iowa Computer Hack Points to China

Iowa investigators suspect a serious breach of a state government computer database last week originated in China. The hackers gained access to a computer system...

From ACM News

Acacia: The Company Tech Loves to Hate

For a company that makes no products, Acacia Research spends a lot of time fighting over patents in court. Acacia has filed at least 337 patent-related lawsuits...

From ACM News

Google Attack Highlights 'zero-Day' Black Market

The recent hacking attack that prompted Google's threat to leave China is underscoring the heightened dangers of previously undisclosed computer security flaws...

Hacking For Fun and Profit in China's Underworld
From ACM News

Hacking For Fun and Profit in China's Underworld

With a few quick keystrokes, a computer hacker who goes by the code name Majia calls up a screen displaying his latest victims. He operates secretly and illegally...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account