acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Chinese It Firm Accused of Links to Cyberwarfare

Beijing-based Venus Info Tech, a provider of IT network security to the Chinese military, has been accused of providing hacker services that help the Chinese government...

From ACM TechNews

Proposed Law Might Make Wi-Fi ­Users Help Cops

Congressional Republicans have introduced the Internet Security Act, legislation in the U.S. House and Senate that would require Internet service providers (ISPs)...

Does Drm Have a Future?
From ACM News

Does Drm Have a Future?

Digital rights management (DRM)  has emerged as a widespread tool to combat piracy. So far, however, DRM systems have proved highly inconvenient to consumers who...

From ACM TechNews

Stealthier Mac Attacks

A security expert at the recent Black Hat DC computer security conference demonstrated a technique for attacking the Mac operating system OS X without leaving any...

From ACM TechNews

A New Internet?

There is a growing belief among engineers and security experts that the only way to fix Internet security is to recreate the Internet from scratch. What a new...

From ACM TechNews

The Cybercrime Wave

The online crime business has never been better and the rising threat of cybercrime stems from criminals' realization that the Internet offers a more profitable...

From ACM TechNews

Fingerprints and Faces Can Be Faked, But Not Brain Patterns

The European Union-funded HUMABIO project is combining new types of biometric recognition systems with the latest sensor technologies to develop better security...

From ACM TechNews

Wi-Fi Networks Offer Rich Environment For Spread of Worms

Malicious software code could infect an entire city in a period of several weeks by traveling over Wi-Fi networks that overlap each other, concludes a study by...

From ACM TechNews

Obama ­Unveils Cybersecurity Agenda

U.S. President Barack Obama has laid out a number of goals for improving the security of the nation's information networks. For instance, he has promised to declare...

The First Internet President
From Communications of the ACM

The First Internet President

Barack Obama's presidential campaign utilized the Internet and information technology unlike any previous political campaign. How politicians and the public interact...

USACM's Policy Role
From Communications of the ACM

USACM's Policy Role

ACM members have a professional duty to ensure that the public comprehends and benefits from advances in computing.

From ACM TechNews

Let the Cracking Begin

Analysts have started the process of testing new Secure Hash Algorithm (SHA) candidates for flaws as part of the first round of the National Institute of Standards...

From ACM TechNews

Group Details 25 Most Dangerous Coding Errors Hackers Exploit

A group of 35 high-profile organizations, including the U.S. Department of Homeland Security and the National Security Agency's Information Assurance Division,...

From ACM TechNews

Nsf Looking For Wicked Cool Visual and Data Analysis Algorithms

The National Science Foundation (NSF) wants to develop highly interpretive mathematical and computational algorithms and techniques to help the U.S. government...

The Long Road to 64 Bits
From Communications of the ACM

The Long Road to 64 Bits

The sometimes contentious development of 64-bit systems shows how technology decisions can have unexpected, enduring consequences.

ACM's Annual Report
From Communications of the ACM

ACM's Annual Report

I would be hard-pressed to recall in my four decades as an ACM member a time as eventful and exceptional as recorded by ACM in FY08.

A Pioneer Woman
From Communications of the ACM

A Pioneer Woman

Programmer Jean Bartik is inducted into the Computer History Museum's Hall of Fellows.

Calculating the Future
From Communications of the ACM

Calculating the Future

Climate researchers have no shortage of scientific issues on which to expend computer power. The biggest problem is choosing which one to tackle first.

From ACM TechNews

A New Web of Trust

A year after security researchers exposed a flaw in the Domain Name System (DNS), a permanent solution is finally being implemented. The DNSSEC protocol, which...

From ACM TechNews

The 9 Hottest Skills For '09

Even with a struggling economy and record unemployment, certain IT skills will be in high demand in the coming year. Programming and application development will...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account