acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Dns Remains Vulnerable One Year After Kaminsky Bug

In the year since security researcher Dan Kaminsky discovered a vulnerability in the domain name system (DNS), which could allow hackers to redirect traffic from...

From ACM TechNews

How Networking Is Transforming Healthcare

High-speed computer networks have the potential to transform the healthcare industry, according to Mike McGill, program director for Internet2's Health Sciences...

A Contest to Train Cyber Combatants
From ACM TechNews

A Contest to Train Cyber Combatants

A consortium that includes the Center for Strategic and International Studies, the SANS Institute, and the U.S. Department of Defense aims to cultivate a new generation...

Government Is Falling Behind on Cybersecurity, Report Finds
From ACM TechNews

Government Is Falling Behind on Cybersecurity, Report Finds

A report released by the Partnership for Public Service and Booz Allen Hamilton has found that the U.S. federal government is falling behind in its efforts to protect...

Researchers Set New Distance Record for Quantum Key Distribution
From ACM TechNews

Researchers Set New Distance Record for Quantum Key Distribution

Researchers from the University of Geneva in Switzerland and Corning Inc. have set a new distance record for quantum key distribution (QKD) using a new prototype...

Council Releases Network Science and Engineering Research Agenda
From ACM TechNews

Council Releases Network Science and Engineering Research Agenda

Ellen Zegura, chair of the Computing Community Consortium's (CCC) Network Science & Engineering (NetSE) Council, released a report during the GENI Engineering Conference...

From ACM News

This Data Will Self-Destruct: Tool Makes Online Info Vanish

The University of Washington has developed a system, called Vanish, that puts an expiration date on electronic data. After a set time period, electronic communications...

From ACM TechNews

Trust But Verify: Security Risks Abound in the It Supply Chain

There are substantial national security issues associated with the use of information technology (IT) products delivered via the global supply chain, including...

U.S. Unveils Cybersecurity Plan
From Communications of the ACM

U.S. Unveils Cybersecurity Plan

'Intent and timing' may help the federal cyberspace initiative work better than previous blueprints.

Learning Through Games
From Communications of the ACM

Learning Through Games

Electronic games can inspire players to explore new ideas and concepts. By gaining a better understanding of the dynamic between player and game, researchers hope...

IT Drives Policy - and Vice Versa
From Communications of the ACM

IT Drives Policy - and Vice Versa

Technologists discuss government policies affecting broadband, patent reform, privacy — and President Obama's effect on it all.

When Robots Invaded the Senate
From ACM TechNews

When Robots Invaded the Senate

The National Science Foundation (NSF) recently held a luncheon briefing and open house for U.S. Senate members to demonstrate cyber-physical systems (CPS), an emerging...

From ACM TechNews

Algorithms to Stop Net Threats

University of Wollongong professor Willy Susilo has received a grant to develop cryptographic algorithms that will stay secure against quantum computer attacks....

Touch Typists Could Help Stop Spammers in Their Tracks
From ACM TechNews

Touch Typists Could Help Stop Spammers in Their Tracks

Newcastle University computer scientists have developed Magic Bullet, a computer game that turns a tedious manual labeling task into entertainment, giving companies...

Georgia Tech to Lead Fight Against Cell Phone Hackers
From ACM TechNews

Georgia Tech to Lead Fight Against Cell Phone Hackers

The Georgia Institute of Technology has won a three-year, $500,000 grant from the National Science Foundation to conduct research into securing cell phones. Georgia...

From ACM News

Ward Off Espionage: India to Design a Home-Grown Microprocessor

Top scientists at some of India's ace scientific institutions are pooling energies, and the government some money, in an ambitious attempt to design a home-grown...

Catching Spammers in the Act
From ACM TechNews

Catching Spammers in the Act

Indiana University researchers have exposed some of the methods spammers use to collect email addresses and send junk mail through multiple computers. In a paper...

Capturing Images in Non-Traditional Way May Benefit Af
From ACM TechNews

Capturing Images in Non-Traditional Way May Benefit Af

Research funded by the U.S. Air Force Office of Scientific Research could lead to advancements in data encryption and wide-area, high-resolution photography. The...

The Next Hacking Frontier: Your Brain?
From ACM TechNews

The Next Hacking Frontier: Your Brain?

Some scientists are concerned that as brain-computer interfaces become widely used and incorporate wireless technologies, "brain hacking" could become a reality...

From ACM TechNews

IBM Security Software Masks Confidential Info

IBM researchers have developed Masking Gateway for Enterprises (MAGEN), software that uses optical character recognition and screen scraping technology to identify...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account