acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Hackers Attack ­c Berkeley Databases

The University of California, Berkeley, began notifying students, alumni and others on Friday (May 8) that their personal information may have been stolen after...

From ACM TechNews

Researchers Take Over Dangerous Botnet

University of California-Santa Barbara (UCSB) researchers temporarily commandeered an infamous botnet known for stealing financial data and found that the threat...

From ACM TechNews

Faa's Air-Traffic Networks Breached By Hackers

The U.S. Transportation Department's inspector general released a report on May 6 that said the U.S.'s civilian air-traffic computer networks had been breached...

From ACM TechNews

Cyber-Command May Help Protect Civilian Networks

The U.S. Pentagon is considering establishing a new cyber-command to oversee government efforts to protect military computer networks and to assist in protecting...

Nist Requests Comments on Automated Computer Security Spec
From ACM News

Nist Requests Comments on Automated Computer Security Spec

The National Institute of Standards and Technology (NIST), an agency of the U.S. Department of Commerce, has issued for public comment a draft publication describing...

How Hackers Can Steal Secrets From Reflections
From ACM TechNews

How Hackers Can Steal Secrets From Reflections

Even the best electronic security may not be enough to protect sensitive data from dogged hackers, and researchers have been able to extract information from the...

­nmasking Social-Network ­sers
From ACM TechNews

­nmasking Social-Network ­sers

University of Texas at Austin researchers have found that, combined with readily available data from other online sources, social network data can reveal sensitive...

Quantum Cryptography: Hackers' R.i.p.?
From ACM TechNews

Quantum Cryptography: Hackers' R.i.p.?

Researchers from Toshiba and Cambridge University's Cavendish Laboratory say secure quantum communication is possible with practical components for high-speed photon...

Software: The Eternal Battlefield in the Unending Cyberwars
From ACM TechNews

Software: The Eternal Battlefield in the Unending Cyberwars

Cybercriminals still have the upper hand on the Internet despite nearly two decades of technological advancement, and Carnegie Mellon University professor William...

Iranians and Others Outwit Net Censors
From ACM TechNews

Iranians and Others Outwit Net Censors

People around the world are circumventing their governments' censorship of Web content using tools developed and provided by a diverse coalition of political and...

From ACM TechNews

Panel Advises Clarifying U.S. Plans on Cyberwar

A report based on a three-year study by a panel assembled by the National Academy of Sciences says the United States does not have a clear military policy on how...

Congressman Langevin Determined to Prevent a 'cyber 9/11'
From ACM TechNews

Congressman Langevin Determined to Prevent a 'cyber 9/11'

In an interview, Rep. James R. Langevin (D-R.I.), the co-founder and co-chair of the House Cybersecurity Caucus, said he promises to do everything he can to prevent...

From ACM TechNews

­U.S. Steps ­Up Effort on Digital Defenses

The United States is engaged in an international race to develop both cyberweapons and cyberdefenses. Thousands of daily attacks on federal and private computer...

Hackers: The China Syndrome
From ACM News

Hackers: The China Syndrome

For years, the U.S. intelligence community worried that China's government was attacking our cyber-infrastructure. Now one man has discovered it's worse: It's hundreds...

From ACM News

China Insists It Does Not Hack Into US Computers

China insisted on Thursday (April 23) that it was opposed to Internet crimes, following a U.S. media report that said Chinese hackers may have been behind a cyber...

From ACM News

Crypto Pioneers Differ on Cloud-Computing Risks

A group of pioneers in the security field, whose work in encryption is used to protect Internet data and communications every day, spoke recently about the state...

Computer Spies Breach Fighter-Jet Project
From ACM News

Computer Spies Breach Fighter-Jet Project

Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project — the Defense Department's costliest weapons program ever — according to...

Smartphones Seen as Eventual Target of Computer Virus Attacks
From ACM TechNews

Smartphones Seen as Eventual Target of Computer Virus Attacks

Northeastern University researchers say that smartphones will soon be targeted by viruses on a massive scale, but a study by the researchers could provide a way...

Harnessing Spammers to Solve AI Problems
From ACM TechNews

Harnessing Spammers to Solve AI Problems

Some Completely Automated Public Turing Test To Tell Computers and Humans Apart (CAPTCHAs) security systems are already being solved by spammers, but CAPTCHA co...

From ACM TechNews

Cyber Spying a Threat, and Everyone Is In On It

The computers of Tibetan exiles and the U.S. electrical grid were recently breached by hackers, highlighting the growing threat of cyber espionage. The White House...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account