acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Cards on the Table: Low-Cost Tool Spots Software Security Flaws During Development Process

NCSU NewsNorth Carolina State University (NCSU) computer security experts have developed Protection Poker, a new risk management tool that helps software developers...

From ACM TechNews

Report From Dartmouth's Institute For Information Infrastructure Protection (i3p) Makes Cyber Security Research Recommendations

Dartmouth College's Institute for Information Infrastructure Protection (I3P) has given the U.S. Senate Committee on Homeland Security and Governmental Affairs...

From Communications of the ACM

A Difficult, Unforgettable Idea

On the 40th anniversary of Douglas C. Engelbart's "The Mother of All Demos," computer scientists discuss the event's influence — and imagine what could have been...

The Evolution of Virtualization
From Communications of the ACM

The Evolution of Virtualization

Virtualization is moving out of the data center and making inroads with mobile computing, security, and software delivery.

Crowd Control
From Communications of the ACM

Crowd Control

Researchers are turning to computers to help us take advantage of our own cognitive abilities and of the wisdom of crowds.

From ACM TechNews

Improved Sensor Technology Could Someday Keep Tabs on Terrorists By Remote Control

Rochester Institute of Technology (RIT) scientists are developing new optical sensors for use in unmanned air vehicles and surveillance drones that could track...

From ACM TechNews

Does Better Security Depend on a Better Internet?

The New York Times' recent article, "Do We Need a New Internet?," by John Markoff, has sparked debate in the research community over whether creating a secure Internet...

From ACM News

Chinese It Firm Accused of Links to Cyberwarfare

Beijing-based Venus Info Tech, a provider of IT network security to the Chinese military, has been accused of providing hacker services that help the Chinese government...

From ACM TechNews

Proposed Law Might Make Wi-Fi ­Users Help Cops

Congressional Republicans have introduced the Internet Security Act, legislation in the U.S. House and Senate that would require Internet service providers (ISPs)...

Does Drm Have a Future?
From ACM News

Does Drm Have a Future?

Digital rights management (DRM)  has emerged as a widespread tool to combat piracy. So far, however, DRM systems have proved highly inconvenient to consumers who...

From ACM TechNews

Stealthier Mac Attacks

A security expert at the recent Black Hat DC computer security conference demonstrated a technique for attacking the Mac operating system OS X without leaving any...

From ACM TechNews

A New Internet?

There is a growing belief among engineers and security experts that the only way to fix Internet security is to recreate the Internet from scratch. What a new...

From ACM TechNews

The Cybercrime Wave

The online crime business has never been better and the rising threat of cybercrime stems from criminals' realization that the Internet offers a more profitable...

From ACM TechNews

Fingerprints and Faces Can Be Faked, But Not Brain Patterns

The European Union-funded HUMABIO project is combining new types of biometric recognition systems with the latest sensor technologies to develop better security...

From ACM TechNews

Wi-Fi Networks Offer Rich Environment For Spread of Worms

Malicious software code could infect an entire city in a period of several weeks by traveling over Wi-Fi networks that overlap each other, concludes a study by...

From ACM TechNews

Obama ­Unveils Cybersecurity Agenda

U.S. President Barack Obama has laid out a number of goals for improving the security of the nation's information networks. For instance, he has promised to declare...

The First Internet President
From Communications of the ACM

The First Internet President

Barack Obama's presidential campaign utilized the Internet and information technology unlike any previous political campaign. How politicians and the public interact...

USACM's Policy Role
From Communications of the ACM

USACM's Policy Role

ACM members have a professional duty to ensure that the public comprehends and benefits from advances in computing.

From ACM TechNews

Let the Cracking Begin

Analysts have started the process of testing new Secure Hash Algorithm (SHA) candidates for flaws as part of the first round of the National Institute of Standards...

From ACM TechNews

Group Details 25 Most Dangerous Coding Errors Hackers Exploit

A group of 35 high-profile organizations, including the U.S. Department of Homeland Security and the National Security Agency's Information Assurance Division,...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account