Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorIDG News Service

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


6 Technologies that Will Change Pcs in 2015
From ACM TechNews

6 Technologies that Will Change Pcs in 2015

Six disruptive technologies could change the face of computing in 2015. 

Nsa Spy Program Targets Mobile Networks
From ACM TechNews

Nsa Spy Program Targets Mobile Networks

The U.S. National Security Agency has been intercepting the internal communications of operators and trade groups, and infiltrating mobile networks around the world...

Popular Android Apps Fail Basic Security Tests, Putting Privacy at Risk
From ACM TechNews

Popular Android Apps Fail Basic Security Tests, Putting Privacy at Risk

Many Android applications fail to take basic precautions to protect user data, putting the privacy of upwards of 1 billion people at risk.

Seven Ways DARPA Is Trying to Kill the Password
From ACM TechNews

Seven Ways DARPA Is Trying to Kill the Password

The U.S. Defense Advanced Research Projects Agency is funding research at institutions working on desktop and mobile authentication technologies.

Estonian Electronic Voting System Vulnerable to Attacks, Researchers Say
From ACM TechNews

Estonian Electronic Voting System Vulnerable to Attacks, Researchers Say

Estonia's electronic voting system cannot guarantee fair elections because of fundamental security weaknesses and poor operations procedures.

Researchers Hope to Secure Development of Mobile Apps With Faster Code Scans
From ACM TechNews

Researchers Hope to Secure Development of Mobile Apps With Faster Code Scans

Fraunhofer Institute researchers are developing three new tools to evaluate or enhance the security of mobile apps. 

The Ietf Needed a Wake-Up Call on Security, Says Chairman
From ACM TechNews

The Ietf Needed a Wake-Up Call on Security, Says Chairman

Internet Engineering Task Force members are focusing on security and how to protect users from pervasive monitoring in a meeting that began Sunday in London. 

White House Pushes Cybersecurity Framework for Critical Infrastructure
From ACM TechNews

White House Pushes Cybersecurity Framework for Critical Infrastructure

The White House has released a new cybersecurity framework designed to help critical infrastructure operators create comprehensive cybersecurity programs. 

New Fujitsu Labs Tech Can Do Batch Searches of Encrypted Data
From ACM TechNews

New Fujitsu Labs Tech Can Do Batch Searches of Encrypted Data

Fujitsu Laboratories has developed a fast method to perform secret searches of data that is encrypted. 

Microsoft Joins Group Seeking to Replace Passwords
From ACM TechNews

Microsoft Joins Group Seeking to Replace Passwords

Microsoft has joined the Fast IDentity Online Alliance, which seeks to develop standards to curb corporate reliance on passwords.

Experimental Malware ­ses Inaudible Sound to Defeat Network Air Gaps
From ACM TechNews

Experimental Malware ­ses Inaudible Sound to Defeat Network Air Gaps

Researchers have tested the feasibility of creating a covert acoustical mesh network between multiple laptops to exchange data using near-ultrasonic frequencies...

Symantec: Google Glass Still Vulnerable to Wi-Fi Attack
From ACM TechNews

Symantec: Google Glass Still Vulnerable to Wi-Fi Attack

Just days after Google said it had patched a QR code vulnerability affecting its Google Glass wearable computer, Symantec says it has found another vulnerability...

Alert! Study Finds Internet Users Heed Browser Warnings
From ACM TechNews

Alert! Study Finds Internet Users Heed Browser Warnings

Security warnings displayed by Web browsers are much more effective at deterring risky Internet behavior than was previously believed, a recent study found.

Feds Asked to Sit Out Defcon Hacking Conference This Year
From ACM TechNews

Feds Asked to Sit Out Defcon Hacking Conference This Year

Defcon hacking convention organizers have asked federal government workers not to attend the event this year. 

'flame' Malware May Have Siblings, Study Finds
From ACM TechNews

'flame' Malware May Have Siblings, Study Finds

A new Flame malware report suggests that the malware's command-and-control interface was made to manage at least four different types of malware, meaning that there...

Emv Flaw Allows 'pre-Play' Attacks on Chip-Enabled Payment Cards
From ACM TechNews

Emv Flaw Allows 'pre-Play' Attacks on Chip-Enabled Payment Cards

University of Cambridge researchers have found that many automated teller machines and point of sale terminals do not properly generate random numbers, as required...

Swiss Scientists Develop Algorithm to Sniff Out the Source of Malware and Spam Attacks
From ACM TechNews

Swiss Scientists Develop Algorithm to Sniff Out the Source of Malware and Spam Attacks

Researchers have developed an algorithm that can find the source of a computer virus, malware, or spam attack by checking only a small percentage of connections...

It Engineers Ponder Fix to Dangerous Internet Routing Problem
From ACM TechNews

It Engineers Ponder Fix to Dangerous Internet Routing Problem

Information technology engineers have been studying methods for fixing a weakness in the Internet's routing system known as the Border Gateway Protocol, which can...

Cryptography Pioneer: We Need Good Code
From ACM TechNews

Cryptography Pioneer: We Need Good Code

Whitfield Diffie, a pioneer of public-key cryptography, told the recent Black Hat Europe conference that a good plan to secure software is needed in the age of...

Nsa Releases a Security-Enhanced Version of Android
From ACM TechNews

Nsa Releases a Security-Enhanced Version of Android

The U.S. National Security Agency has released a security-enhanced version of Android. SE Android enforces stricter access control policies than those available...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account