Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorNew Scientist

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Smarter Password Checker Lets You Compare With Others
From ACM TechNews

Smarter Password Checker Lets You Compare With Others

Researchers have developed a system designed to rate passwords relative to those already stored in a Web site's database. The password checker can tell users if...

From ACM News

Cyberwar Storm Clouds Are Gathering

Cyberspace. Some call it the new domain of war, after land, sea, air, and space.

Casino Cheats Snared by Smart Camera System
From ACM News

Casino Cheats Snared by Smart Camera System

People trying to cheat in casinos may soon be taking more of a gamble than they realise. Grosvenor Casinos, a major UK chain, is assessing software that can spot...

From ACM News

Quantum Keys Let Submarines Talk Securely

Submarines must be able to talk securely with remote naval bases while remaining submerged. Could quantum communications allow them to pull off this technically...

Quantum Hackers: Cracking the ­ncrackable Code
From ACM TechNews

Quantum Hackers: Cracking the ­ncrackable Code

Norwegian University of Science and Technology researcher Vadim Makarov has developed a quantum cryptography method to defend against attacks of quantum key distribution...

Air Traffic System Vulnerable to Cyber Attack
From ACM TechNews

Air Traffic System Vulnerable to Cyber Attack

Automatic Dependent Surveillance-Broadcast (ADS-B) technology uses unencrypted global positioning system signals to broadcast a plane's position to networks. The...

Dumping Friends on Facebook Helps Make You Secure
From ACM TechNews

Dumping Friends on Facebook Helps Make You Secure

Arizona State University researcher Pritam Gundecha has developed a method for determining which Facebook friends are most likely to leak private information. 

From ACM TechNews

Image Searches 'poisoned' By Cybercriminals

More than 113 million Internet users were redirected to malicious pages due to search engine poisoning in May 2011, according to Trend Micro. 

Face Recognition Technology Fails to Find U.k. Rioters
From ACM News

Face Recognition Technology Fails to Find U.k. Rioters

The response was as aggressive and swift as the riots themselves. Within a few hours of the worst of the looting across London and other English cities, attempts...

'Fluid Cloak' to Help Submarines Leave No Wake
From ACM News

'Fluid Cloak' to Help Submarines Leave No Wake

Super-stealthy submarines may one day glide through the water without creating a wake, if a plan to channel fluid intelligently around objects can be made to...

From ACM News

Why Bitcoin Is Not As Anonymous As Most ­sers Think

People who use Bitcoin to ensure their purchases remain anonymous may want to reconsider their reliance on the online peer-to-peer currency, say researchers who...

From ACM News

Welcome to the Age of the Splinternet

Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?

Interview with Key Lulzsec Hacker
From ACM News

Interview with Key Lulzsec Hacker

It was early May when LulzSec's profile skyrocketed after a hack on the giant Sony corporation. LulzSec's name comes from Lulz, a corruption of LOL, often denoting...

Cracking the Code of Machine Translation
From ACM TechNews

Cracking the Code of Machine Translation

University of Southern California scientists have developed a machine-translation technique that treats translation as a cryptographic challenge rather than a matter...

Botclouds: A Cyberattacker's Dream
From ACM TechNews

Botclouds: A Cyberattacker's Dream

Delft University researchers are studying how botclouds can be used to launch attacks, send spam, and commit fraud. 

From ACM News

Spies Can Send Messages Hidden in a Google Search

The peculiar list of search options that Google suggests as you type in a query could be hijacked to let people communicate secretly.

Gender-Spotting Tool Could Have Rumbled Fake Blogger
From ACM TechNews

Gender-Spotting Tool Could Have Rumbled Fake Blogger

A gender analysis program developed by Stevens Institute of Technology researcher Na Cheng could have determined the sex of a 40-year-old U.S. man writing online...

The Defenders: Inside an Online Siege
From ACM News

The Defenders: Inside an Online Siege

In a quiet, windowless auditorium in Bristol, in the west of England, Lucy Robson and her team hunch over their laptops as the seconds on a giant clock above...

From ACM News

Covert Hard Drive Fragmentation Embeds a Spy's Secrets

Good news for spies. There is now a way to hide data on a hard drive without using encryption. Instead of using a cipher to scramble text, the method involves...

Quantum Trickery Could Lead to Stealth Radar
From ACM News

Quantum Trickery Could Lead to Stealth Radar

Stealthy radar systems and the ability to transmit large amounts of data over long distances are a step closer thanks to a technique that could improve the efficiency...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account