acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Contractors Vie For Plum Work, Hacking For U.s.
From ACM News

Contractors Vie For Plum Work, Hacking For U.s.

The U.S. government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The...

Pentagon Plans New Arm to Wage Computer Wars
From ACM TechNews

Pentagon Plans New Arm to Wage Computer Wars

The U.S. Pentagon is planning to establish a new cyberwarfare command as a complement to a soon-to-be-announced civilian computer network safety overhaul, according...

Craigslist Founder to Keynote Computer Policy Conference
From ACM TechNews

Craigslist Founder to Keynote Computer Policy Conference

Craigslist founder Craig Newmark will give the keynote address at ACM's 2009 Conference on Computers, Freedom and Privacy (CFP), which takes place from June 1-4...

From ACM TechNews

Viral Epidemics Poised to Go Mobile

A research team led by Northeastern University Center for Complex Network Research director Albert-Laszlo Barabasi set out to investigate why smartphone and mobile...

Obama Set to Create a Cybersecurity Czar With Broad Mandate
From ACM TechNews

Obama Set to Create a Cybersecurity Czar With Broad Mandate

U.S. President Barack Obama is expected to announce that he will create a cyberczar position, adding a senior White House official who will have broad authority...

From ACM News

Fake Web Traffic Can Hide Secret Chat

The Internet's underlying technology can be harnessed to let people exchange secret messages, perhaps allowing free, coded speech under oppressive regimes. So says...

New Puzzles That Tell Humans From Machines
From ACM News

New Puzzles That Tell Humans From Machines

To stay one jump ahead of fraudsters and their automated rogue programs, researchers are devising more versions of CAPTCHA (Completely Automated Public Turing test...

Chink in Encryption Armor Discovered
From ACM TechNews

Chink in Encryption Armor Discovered

Researchers from the Information Security Group (ISG) at Royal Holloway, University of London have discovered an underlying flaw in the OpenSSH encryption protocol...

Are Your 'secret Questions' Too Easily Answered?
From ACM TechNews

Are Your 'secret Questions' Too Easily Answered?

The "secret questions" that protect online accounts and passwords may be far less secure than commonly believed, largely because their answers are often far too...

Autonomous Helicopters
From Communications of the ACM

Autonomous Helicopters

Researchers are improving unmanned helicopters' capabilities to address regulatory requirements and commercial uses.

Content Control
From Communications of the ACM

Content Control

Entertainment businesses say digital rights management prevents the theft of their products, but access control technologies have been a uniform failure when it...

Micromedicine to the Rescue
From Communications of the ACM

Micromedicine to the Rescue

Medical researchers have long dreamed of "magic bullets" that go directly where they are needed. Now micromedicine and nanotechnology are making a range of molecules...

A Blueprint to Stop Browser Attacks
From ACM TechNews

A Blueprint to Stop Browser Attacks

University of Illinois at Chicago (UIC) researchers will present a new way of defending against cross-site scripting attacks at the upcoming IEEE Symposium on Security...

From ACM TechNews

Is the ­U.S. Ready For Government-Sponsored Cyberattacks?

A recently published report from the National Research Council (NRC) contends that there has to be more public disclosure and informed debate about cyberarms and...

China Develops Quantum Cryptography Network
From ACM TechNews

China Develops Quantum Cryptography Network

Researchers at the University of Science and Technology of China say they have developed the first optical quantum cryptography network. The quantum communication...

Tracking Cyberspies Through the Web Wilderness
From ACM TechNews

Tracking Cyberspies Through the Web Wilderness

The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...

Mathematical Advances Strengthen It Security
From ACM TechNews

Mathematical Advances Strengthen It Security

A new cryptography approach based on the mathematical theory of elliptic curves is considered a leading candidate to replace the widely used RSA public key security...

From ACM News

'kill Switch' Disables Stolen Laptops

A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...

From ACM News

China Has Developed Its Own Operating System For Cyber War With U.S.

A leading cyber security specialist said last week that China has developed its own ultra-secure operating system for a strategic edge in its cyber warfare with...

Professor Wants Exemption to Study Video Game Anti-Piracy Software
From ACM TechNews

Professor Wants Exemption to Study Video Game Anti-Piracy Software

University of Michigan professor Alex Halderman wants to research whether the anti-piracy software built into computer games makes computers more vulnerable to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account