acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Researchers Try to Stalk Botnets ­sed By Hackers

To track the spread of botnets, Sandia National Laboratories computer security specialists Rob Minnich and Don Rudish have converted a Dell Thunderbird supercomputer...

From ACM TechNews

E-Mail Surveillance Renews Concerns in Congress

A National Security Agency (NSA) operation involving surveillance of American residents' communications, especially domestic email, is fueling debate in the U.S...

From ACM TechNews

Obama Outlines Coordinated Cyber-Security Plan

U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...

Contractors Vie For Plum Work, Hacking For U.s.
From ACM News

Contractors Vie For Plum Work, Hacking For U.s.

The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...

Pentagon Plans New Arm to Wage Computer Wars
From ACM TechNews

Pentagon Plans New Arm to Wage Computer Wars

The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...

New Puzzles That Tell Humans From Machines
From ACM News

New Puzzles That Tell Humans From Machines

To stay one jump ahead of fraudsters and their automated rogue programs, researchers are devising more versions of CAPTCHA (Completely Automated Public Turing test...

Tracking Cyberspies Through the Web Wilderness
From ACM TechNews

Tracking Cyberspies Through the Web Wilderness

The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...

From ACM News

'kill Switch' Disables Stolen Laptops

A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...

Cadets Trade the Trenches For Firewalls
From ACM TechNews

Cadets Trade the Trenches For Firewalls

Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...

Iranians and Others Outwit Net Censors
From ACM TechNews

Iranians and Others Outwit Net Censors

People around the world are circumventing their governments' censorship of Web content using tools developed and provided by a diverse coalition of political and...

From ACM TechNews

Panel Advises Clarifying U.S. Plans on Cyberwar

A report based on a three-year study by a panel assembled by the National Academy of Sciences says the United States does not have a clear military policy on how...

From ACM TechNews

­U.S. Steps ­Up Effort on Digital Defenses

The United States is engaged in an international race to develop both cyberweapons and cyberdefenses. Thousands of daily attacks on federal and private computer...

From ACM TechNews

Experts See Early Activity From the Conficker Worm

An informal group of computer security experts said they have observed early attempts by the Conficker virus to communicate with a control server, but they are...

From ACM TechNews

A New Internet?

There is a growing belief among engineers and security experts that the only way to fix Internet security is to recreate the Internet from scratch. What a new...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account