Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorMIT News

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Helping Companies Prioritize Their Cybersecurity Investments
From ACM TechNews

Helping Companies Prioritize Their Cybersecurity Investments

A platform developed by researchers at the Massachusetts Institute of Technology can quantify security risks for companies without requiring them to disclose sensitive...

Protecting Sensitive Metadata So It Can't be Used for Surveillance
From ACM TechNews

Protecting Sensitive Metadata So It Can't be Used for Surveillance

MIT researchers have developed a scalable metadata-protection scheme to shield the information of millions of users.

Cryptographic 'Tag of Everything' Could Protect Supply Chain
From ACM TechNews

Cryptographic 'Tag of Everything' Could Protect Supply Chain

A new cryptographic identity tag can be attached to virtually any product in order to verify its authenticity.

Better Autonomous 'Reasoning' at Tricky Intersections
From ACM TechNews

Better Autonomous 'Reasoning' at Tricky Intersections

A new model can help autonomous vehicles determine when it is safe to proceed into traffic at intersections with obstructed views.

Helping Autonomous Vehicles See Around Corners
From ACM TechNews

Helping Autonomous Vehicles See Around Corners

Massachusetts Institute of Technology engineers have created a system that perceives tiny fluctuations in ground shadows to ascertain whether an unseen object is...

Algorithm Tells Robots Where Nearby Humans are Headed
From ACM TechNews

Algorithm Tells Robots Where Nearby Humans are Headed

A new algorithm accurately aligns partial trajectories in real time, allowing motion predictors in self-driving cars to accurately anticipate the timing of a person's...

Improving Security as AI Moves to Smartphones
From ACM TechNews

Improving Security as AI Moves to Smartphones

Researchers suggest the vulnerability of compressed, or quantized, artificial intelligence models to adversarial attack could be remedied by adding a mathematical...

Novel Transmitter Protects Wireless Data From Hackers
From ACM TechNews

Novel Transmitter Protects Wireless Data From Hackers

A new transmitter can hack-proof wireless data by frequency hopping each individual 1 or 0 bit of a data packet, every microsecond.

Private Browsing Gets More Private
From ACM TechNews

Private Browsing Gets More Private

The new Veil system is designed to improve private browsing by guaranteeing that any data the browser loads into memory remains encrypted until it is displayed...

Energy-Efficient Encryption for the Internet of Things
From ACM TechNews

Energy-Efficient Encryption for the Internet of Things

A new chip performs public-key encryption while consuming only 1/400 as much power as software execution of the same protocols would.

New 3D Chip Combines Computing and Data Storage
From ACM TechNews

New 3D Chip Combines Computing and Data Storage

A new computer chip integrates carbon nanotubes and resistive random-access memory cells.

­sing Bitcoin to Prevent Identify Theft
From ACM TechNews

­sing Bitcoin to Prevent Identify Theft

A new system uses bitcoin's security mechanisms to foil online identify thieves.

Protecting Web ­sers' Privacy
From ACM TechNews

Protecting Web ­sers' Privacy

Splinter is a new encryption system that disguises users' database queries so they reveal no private information.

How to Stay Anonymous Online
From ACM TechNews

How to Stay Anonymous Online

New technology for protecting anonymity online provides stronger security guarantees but uses bandwidth much more efficiently than previous anonymity networks.

How to Stay Anonymous Online
From ACM News

How to Stay Anonymous Online

Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most...

We Know Where You Live
From ACM TechNews

We Know Where You Live

Researchers have demonstrated that snoopers armed with little sophisticated technology can expose the home and workplace addresses of Twitter users. 

Robotic Consensus
From ACM News

Robotic Consensus

Planning algorithms for teams of robots fall into two categories: centralized algorithms, in which a single computer makes decisions for the whole team, and decentralized...

Hack-Proof Rfid Chips
From ACM TechNews

Hack-Proof Rfid Chips

Researchers at the Massachusetts Institute of Technology and Texas Instruments have developed a virtually hack-proof radio-frequency identification chip.

Untraceable Communication Guaranteed
From ACM TechNews

Untraceable Communication Guaranteed

Massachusetts Institute of Technology researchers have unveiled an untraceable text-messaging system designed to foil even the most powerful adversaries.

Untraceable Communication—guaranteed
From ACM News

Untraceable Communication—guaranteed

Anonymity networks, which sit on top of the public Internet, are designed to conceal people’s Web-browsing habits from prying eyes.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account