Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorNew Scientist

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


U.S. Military Facial Recognition System Could Work From 1 Kilometer Away
From ACM TechNews

U.S. Military Facial Recognition System Could Work From 1 Kilometer Away

The U.S. Special Operations Command  is developing a portable facial recognition system that can identify individuals from 1 kilometer (0.6 miles) off. 

China is Using Mass Surveillance Tech to Fight Coronavirus Spread
From ACM TechNews

China is Using Mass Surveillance Tech to Fight Coronavirus Spread

The Chinese government is working with technology companies to monitor citizens and track confirmed cases of people infected with the coronavirus.

SIM Swapping, Poor Web Security Put Millions at Risk
From ACM TechNews

SIM Swapping, Poor Web Security Put Millions at Risk

Researchers at Princeton University have found that two-factor authentication is easily hackable and could put millions of people at risk.

Hackers Are Stealing Computer Power to Make Millions in Cryptocurrency
From ACM TechNews

Hackers Are Stealing Computer Power to Make Millions in Cryptocurrency

Groups of hackers are stealing millions of dollars through cryptojacking, which works by illicitly harnessing the computing power of thousands to mine cryptocurrency...

Quantum Network Joins Four People Together for Encrypted Messaging
From ACM TechNews

Quantum Network Joins Four People Together for Encrypted Messaging

A new network design uses quantum key distribution to secure messages among four users.

An AI Lie Detector Will Interrogate Travelers at Some E­ Borders
From ACM TechNews

An AI Lie Detector Will Interrogate Travelers at Some E­ Borders

An artificial intelligence-based lie detector system will be used on international travelers during a six-month pilot program at border crossings in Hungary, Latvia...

Think Your Surfing Is Secret in Private Browsing Mode? Think Again
From ACM TechNews

Think Your Surfing Is Secret in Private Browsing Mode? Think Again

Many computer users incorrectly believe private browsing protects them against computer viruses, targeted ads, geolocation, and tracking by employers and governments...

Researcher: 'we Should Be Worried' This Computer Thought a Turtle Was a Gun
From ACM TechNews

Researcher: 'we Should Be Worried' This Computer Thought a Turtle Was a Gun

The Massachusetts Institute of Technology's LabSix artificial intelligence team has demonstrated the first example of a three-dimensional object becoming "adversarial"...

Siri and Alexa Can Be Turned Against You By ­ltrasound Whispers
From ACM TechNews

Siri and Alexa Can Be Turned Against You By ­ltrasound Whispers

Researchers have developed a method to hijack intelligent voice assistant using sounds above the range of human hearing.

Your Broadband Provider Can ­se Your Smart Devices to Spy on You
From ACM TechNews

Your Broadband Provider Can ­se Your Smart Devices to Spy on You

Internet service providers can access the data on Internet-connected devices people use in their homes, even when those devices are set up to protect users' privacy...

Your Broadband Provider Can ­se Your Smart Devices to Spy on You
From ACM News

Your Broadband Provider Can ­se Your Smart Devices to Spy on You

How much of your privacy would you trade for a smarter home? Internet service providers (ISPs) can peek at the internet-connected devices people use in their own...

Sneaky Attacks Trick Ais Into Seeing or Hearing What's Not There
From ACM TechNews

Sneaky Attacks Trick Ais Into Seeing or Hearing What's Not There

A new technique could be used by hackers to trick autonomous cars into ignoring stop signs or prevent surveillance cameras from spotting a suspect.

Peering Inside an Ai's Brain Will Help ­S Trust Its Decisions
From ACM News

Peering Inside an Ai's Brain Will Help ­S Trust Its Decisions

Oi, AI—What do you think you're looking at? Understanding why machine learning algorithms can be tricked into seeing things that aren't there is becoming more important...

Why the Dark Net Is More Resilient to Attack Than the Internet
From ACM TechNews

Why the Dark Net Is More Resilient to Attack Than the Internet

Researchers who built their own model of the dark net ran simulations to see how the model would react to three failure scenarios.

Voice-Checking Device Stops Hackers Hijacking Your Siri or Alexa
From ACM TechNews

Voice-Checking Device Stops Hackers Hijacking Your Siri or Alexa

A wearable device under development at the University of Michigan provides continuous authentication for voice assistants such as Apple's Siri or Amazon's Alexa...

Brainwaves Could Act as Your Password--but Not If You're Drunk
From ACM TechNews

Brainwaves Could Act as Your Password--but Not If You're Drunk

Rochester Institute of Technology have found that although brainwave readings can accurately authenticate someone's identity about 94% of the time, there could...

Army of 350,000 Star Wars Bots Found Lurking on Twitter
From ACM TechNews

Army of 350,000 Star Wars Bots Found Lurking on Twitter

Researchers at University College London in the U.K. discovered a Twitter botnet that could be comprised of more than 350,000 accounts.

Lazy Coders Are Training Artificial Intelligences to Be Sexist
From ACM TechNews

Lazy Coders Are Training Artificial Intelligences to Be Sexist

Artificial intelligence systems can form flawed and stereotypical word associations by learning from biased data samples.

Glasses Make Face Recognition Tech Think You're Milla Jovovich
From ACM TechNews

Glasses Make Face Recognition Tech Think You're Milla Jovovich

Carnegie Mellon University researchers have designed eyeglasses with patterned frames that can obscure the identity of the wearer to facial-recognition algorithms...

Your Home's Online Gadgets Could Be Hacked By ­ltrasound
From ACM News

Your Home's Online Gadgets Could Be Hacked By ­ltrasound

This may have happened to you. You idly browse a pair of shoes online one morning, and for the rest of the week, those shoes follow you across the Internet, appearing...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account