acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Should We Fire the First Shot in a Cyberwar?

Military bureaucracies around the world are likely to see offensive capabilities as increasingly attractive in any cyberwar, suggests the head of the computer...

Seven Ways to Get Yourself Hacked
From ACM News

Seven Ways to Get Yourself Hacked

In recent months, I've met at least three people who have been the victim of hackers who've taken over their Gmail accounts and sent out emails to everyone in...

From ACM News

The Cyber Security Industrial Complex

Documents point to a huge industry that provides online surveillance tools to governments and police agencies.

From ACM News

Will the Kinect 2 Be Able to Read Your Lips?

How will users hack this one? The Kinect is a device that inherently grows and expands: Microsoft itself has come around to acknowledging that the oft-hackedreally...

Everything You Need to Know About Carrieriq
From ACM News

Everything You Need to Know About Carrieriq

"Carrier IQ" is a company that sells software to wireless companies that reports how well networks are performing in real-time, by sending performance data from...

Can Software Patch the Ailing Power Grid?
From ACM TechNews

Can Software Patch the Ailing Power Grid?

A consortium providing the technology for a large-scale smart grid project says the software is nearly complete. 

From ACM News

Transcending Borders but Not Laws

As cloud computing spreads data around the globe, a haze of legal and privacy questions follows.

The Next Wave of Botnets Could Descend from the Skies
From ACM News

The Next Wave of Botnets Could Descend from the Skies

The buzz starts low and quickly gets louder as a toy quadricopter flies in low over the buildings. It might look like flight enthusiasts having fun, but it could...

From ACM News

Csi: Tech to Automatically Identify the Bad Guy

Researchers hope a new system could automatically scan the hours of CCTV footage police have to comb through to identify suspects without invading privacy.

Personal Security
From ACM TechNews

Personal Security

Researchers have developed a laptop-sized device that emits a jamming signal whenever it detects an unauthorized wireless link being established between a medical...

A Cloud That Can't Leak
From ACM TechNews

A Cloud That Can't Leak

Microsoft researchers have developed a prototype data security system designed to ensure that information can only escape in an encrypted form that would be nearly...

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future
From ACM News

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future

Ever since Google announced that its Android phones would be equipped with a "digital wallet" that allows users to pay for things simply by touching their phone...

Forget Passwords and Let the Browser Remember
From ACM TechNews

Forget Passwords and Let the Browser Remember

The Mozilla Foundation recently released BrowserID, an experimental tool designed to change the way users identify themselves online by storing identity information...

A Futures Market For Computer Security
From ACM TechNews

A Futures Market For Computer Security

A pilot prediction market that can forecast major information security incidents before they occur is under development by information security researchers from...

From ACM News

Bug-Squashing Tools Offered to Improve Network Security

The Department of Homeland Security has announced an initiative to shore up security by squashing software bugs. This follows a slew of high-profile attacks on...

Software Extracts Your Location on Twitter Even When It's Secret
From ACM TechNews

Software Extracts Your Location on Twitter Even When It's Secret

Users of online social media reveal more about themselves than they realize, and participation involves a great deal more trust than they think, suggests new research...

Most Malware Tied to 'pay-Per-Install' Market
From ACM TechNews

Most Malware Tied to 'pay-Per-Install' Market

Researchers have found that most personal computers that get infected with malware were targeted by pay-per-install services, which charge hacking gangs up to $180...

Making the Case For Security
From ACM News

Making the Case For Security

Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....

What Bitcoin Is, and Why It Matters
From ACM News

What Bitcoin Is, and Why It Matters

Recent weeks have been exciting for a relatively new kind of currency speculator. In just three weeks, the total value of a unique new digital currency called...

Tracking How Mobile Apps Track You
From ACM News

Tracking How Mobile Apps Track You

Third-party apps are the weakest link in user privacy on smart phones. They often get access to large quantities of user data, and there are few rules covering...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account