acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Fearing Hackers Who Leave No Trace

The crown jewels of Google, Cisco Systems or any other technology company are the millions of lines of programming instructions, known as source code, that make...

From ACM TechNews

Wanted: Cyber Ninjas

U.S. colleges are adding courses and specialized degrees in the once-exotic field of cybersecurity to try to meet the growing demands for computer security skills...

From ACM News

Are Doctors Ready for Virtual Visits?

For over a decade now, health care experts have been promoting telemedicine, or the use of satellite technology, video conferencing and data transfer through phones...

Obama to Name Chief of Cybersecurity
From ACM News

Obama to Name Chief of Cybersecurity

Nearly seven months after highlighting the vulnerability of banking, energy and communications systems to Internet attacks, the White House on Tuesday is expected...

From ACM News

Google Offers Peek at Operating System, a Potential Challenge to Windows

MOUNTAIN VIEW, Calif. — Google began lifting the veil on its planned Chrome operating system on Thursday, but it said that computers powered by the software would...

From ACM News

Defying Experts, Rogue Computer Code Still Lurks

Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...

Halted '03 Iraq Plan Illustrates ­.s. Fear of Cyberwar Risk
From ACM TechNews

Halted '03 Iraq Plan Illustrates ­.s. Fear of Cyberwar Risk

At the core of the U.S. Obama Administration and its Pentagon leadership's efforts to develop rules governing cyberwarfare is the question of whether offensive...

From ACM TechNews

Researchers Try to Stalk Botnets ­sed By Hackers

To track the spread of botnets, Sandia National Laboratories computer security specialists Rob Minnich and Don Rudish have converted a Dell Thunderbird supercomputer...

From ACM TechNews

E-Mail Surveillance Renews Concerns in Congress

A National Security Agency (NSA) operation involving surveillance of American residents' communications, especially domestic email, is fueling debate in the U.S...

From ACM TechNews

Obama Outlines Coordinated Cyber-Security Plan

U.S. President Barack Obama announced that the country's disjointed efforts to "deter, prevent, detect, and defend" against cyberattacks will now be run by the...

Contractors Vie For Plum Work, Hacking For U.s.
From ACM News

Contractors Vie For Plum Work, Hacking For U.s.

The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...

Pentagon Plans New Arm to Wage Computer Wars
From ACM TechNews

Pentagon Plans New Arm to Wage Computer Wars

The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...

New Puzzles That Tell Humans From Machines
From ACM News

New Puzzles That Tell Humans From Machines

To stay one jump ahead of fraudsters and their automated rogue programs, researchers are devising more versions of CAPTCHA (Completely Automated Public Turing test...

Tracking Cyberspies Through the Web Wilderness
From ACM TechNews

Tracking Cyberspies Through the Web Wilderness

The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...

From ACM News

'kill Switch' Disables Stolen Laptops

A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...

Cadets Trade the Trenches For Firewalls
From ACM TechNews

Cadets Trade the Trenches For Firewalls

Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...

Iranians and Others Outwit Net Censors
From ACM TechNews

Iranians and Others Outwit Net Censors

People around the world are circumventing their governments' censorship of Web content using tools developed and provided by a diverse coalition of political and...

From ACM TechNews

Panel Advises Clarifying U.S. Plans on Cyberwar

A report based on a three-year study by a panel assembled by the National Academy of Sciences says the United States does not have a clear military policy on how...

From ACM TechNews

­U.S. Steps ­Up Effort on Digital Defenses

The United States is engaged in an international race to develop both cyberweapons and cyberdefenses. Thousands of daily attacks on federal and private computer...

From ACM TechNews

Experts See Early Activity From the Conficker Worm

An informal group of computer security experts said they have observed early attempts by the Conficker virus to communicate with a control server, but they are...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account