Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorNew Scientist

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


AI Lie Detection Could Help Crack Terror Cells
From ACM News

AI Lie Detection Could Help Crack Terror Cells

In A bar in Maastricht University in the Netherlands, 12 students are each given an envelope marked "Top Secret." Inside are plans for a terror attack somewhere...

GPS Chaos: How a $30 Box Can Jam Your Life
From ACM News

GPS Chaos: How a $30 Box Can Jam Your Life

Signals from GPS satellites now help you to call your mother, power your home, and even land your plane – but a cheap plastic box can jam it all.

Augmented Reality Iphone Helps Police Track Suspects
From ACM News

Augmented Reality Iphone Helps Police Track Suspects

Picture the scene: armed police officers are warned on their radios that a suspected male terrorist has been tracked to a crowded football stadium.

The Cyberweapon That Could Take Down the Internet
From ACM TechNews

The Cyberweapon That Could Take Down the Internet

University of Minnesota researchers have developed a cyberweapon that turns the structure of the Internet against itself, but ultimately could be used to make the...

From ACM TechNews

Cryptographers Chosen to Duke It Out in Final Fight

The U.S. National Institute of Standards and Technology has selected five Secure Hash Algorithm (SHA-3) entrants as finalists for its competition to find a replacement...

From ACM News

Cryptographers Chosen to Duke It Out in Final Fight

A competition to find a replacement for one of the gold-standard computer security algorithms used in almost all secure, online transactions just heated up.

Criminals Find the Key to Car Immobilizers
From ACM News

Criminals Find the Key to Car Immobilizers

For 16 years, car immobilisers have kept car thieves at bay, but that may now be changing.

Criminals Find the Key to Car Immobilizers
From ACM News

Criminals Find the Key to Car Immobilizers

For 16 years, car immobilisers have kept car thieves at bay, but that may now be changing.

Why the Stuxnet Worm Is Like Nothing Seen Before
From ACM News

Why the Stuxnet Worm Is Like Nothing Seen Before

Stuxnet is the first worm of its type capable of attacking critical infrastructure like power stations and electricity grids: those in the know have been expecting...

From ACM News

Flawed Proof ­shers In Era of Wikimath

His prospects of answering one of the biggest questions in mathematics may be fading, but Vinay Deolalikar of Hewlett-Packard Labs in Palo Alto, California, may...

From ACM News

Hiding Files in Flickr Pics Will Fool Web Censors

Life is about to become more difficult for countries trying to censor access to foreign Websites. A system dubbed Collage will allow users in these countries...

From ACM News

P ? Np? It's Bad News For the Power of Computing

Has the biggest question in computer science been solved? On 6 August, Vinay Deolalikar, a mathematician at Hewlett-Packard Labs in Palo Alto, California, sentdraft...

Social Web: The Great Tipping Point Test
From ACM News

Social Web: The Great Tipping Point Test

Every move you make, every twitter feed you update, somebody is watching you. You may not think twice about it, but if you use a social networking site, a cellphone...

From ACM News

The Tech Refresher Russia's Spies Needed

From James Bond to Johnny English, the movies give us the impression that spies are top of the tree when it comes to money-no-object espionage technology. But that...

From ACM News

Entangle Qubits for a True Random Number Machine

Pure randomness is surprisingly difficult to create, even if you draw on the inherent randomness of quantum mechanics. Now, though, a "true" random number generator...

From ACM TechNews

Sending Botnets the Way of Smallpox

University of Tulsa researchers have published a legal study on three "technically feasible" compulsory vaccination scenarios that governments could consider to...

­sb Fingerprints Identify 'pod Slurping' Data Thieves
From ACM TechNews

­sb Fingerprints Identify 'pod Slurping' Data Thieves

Intellectual property thieves who engage in so-called pod-slurping attacks leave a "USB fingerprint," according to Vasilios Katos and Theodoros Kavallaris of the...

From ACM News

Cellphone Traces Reveal You're So Predictable

We may all like to consider ourselves free spirits. But a study of the traces left by 50,000 cellphone users over three months has conclusively proved otherwise...

From ACM News

Typos May Earn Google $500m a Year

Google may be earning $500 million a year via companies and individuals who register deceptive Web site addresses. The claim centers on a controversial scheme known...

­.s. Networks and Power Grid ­nder (mock) Cyber-Attack
From ACM News

­.s. Networks and Power Grid ­nder (mock) Cyber-Attack

Unknown hackers have taken out U.S. cellphone networks in an ongoing cyber-attack that will soon knock out parts of the nation's electricity grid – say the officials...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account