acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Parc Readies Printed Electronics For Market
From ACM News

Parc Readies Printed Electronics For Market

Early 2011 will see printed memory devices in toys and printed sensors in packages used to ship drugs.

From ACM News

New Class of Malware Attacks Specific Chips

Computer scientists reveal malware that attacks specific processors rather than the operating system that runs on them.

Watch Where You're Going
From ACM News

Watch Where You're Going

Businesses are quietly buying mobile-phone data to discover the paths that consumers take.

Anticensorship Tool Proves Too Good to Be True
From ACM News

Anticensorship Tool Proves Too Good to Be True

Experts warn that the software could identify those it claims to protect.

Preventing Smart-Phone Armageddon
From ACM TechNews

Preventing Smart-Phone Armageddon

Attacks against smartphones are likely to proliferate because of their growing ubiquity and the sensitive information they carry. However, researchers believe...

Taking Over a Car
From ACM News

Taking Over a Car

Researchers "break in" with software and a laptop.

What Does 'p vs. Np' Mean For the Rest of Us?
From ACM News

What Does 'p vs. Np' Mean For the Rest of Us?

A proposed "proof" is probably a bust—but even failed attempts can advance computer science.

Mobile Flaw Could Cloak Clicks
From ACM TechNews

Mobile Flaw Could Cloak Clicks

Stanford University researchers have found that mobile websites are extremely vulnerable to attacks from malicious sites using a technique known as tapjacking,...

From ACM News

A Sidewalk Disappearing Act

Automatically removing people from street-level imagery could help prevent privacy complaints.

Wireless Car Sensors Vulnerable to Hackers
From ACM News

Wireless Car Sensors Vulnerable to Hackers

Hackers could "hijack" the wireless pressure sensors built into many cars' tires, researchers have found. Criminals might then track a vehicle or force its electronic...

Wikileaks Backlash Could Mean Less Data For Soldiers
From ACM News

Wikileaks Backlash Could Mean Less Data For Soldiers

Information shared with troops may be restricted.

Hacking the Smart Grid
From ACM News

Hacking the Smart Grid

The hurried deployment of smart-grid technology could leave critical infrastructure and private homes vulnerable to hackers. Security experts at the Black Hat...

From ACM News

The Hunt For the Wikileaks Whistle-Blower

Attorney General Eric Holder's new probe into Wikileaks's posting of 91,000 war documents will likely find that tracing the path of the documents back through the...

From ACM News

So Many Bugs, So Little Time

Tools that find serious bugs automatically could lead to safer, more stable software.

Passwords that Are Simple
From ACM News

Passwords that Are Simple

Researchers at Microsoft have come up with a way to create easy-to-remember passwords without making a system more vulnerable to hackers.

Nanoscale Random Number Circuit to Secure Future Chips
From ACM TechNews

Nanoscale Random Number Circuit to Secure Future Chips

Intel engineers have created computer processors with circuits capable of random behavior, a development that could lead to secure cryptography keys.

From ACM News

Computing with Secrets, but Keeping them Safe

A novel technique could see future Web services work with sensitive data without ever being able to read it. Several implementations of a mathematical proof unveiled...

New Cyber Chief Outlines Strategy
From ACM News

New Cyber Chief Outlines Strategy

Security experts said this week that they were cheered by calls from General Keith Alexander, head of the new U.S. Cyber Command, for global rules of engagement...

Open-Source Could Mean an Open Door For Hackers
From ACM News

Open-Source Could Mean an Open Door For Hackers

The ability to access the code of open-source applications may give attackers an edge in developing exploits for the software, according to a paper analyzing two...

Mobile Data: A Gold Mine For Telcos
From ACM News

Mobile Data: A Gold Mine For Telcos

Cell phone companies are finding that they're sitting on a gold mine--in the form of the call records of their subscribers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account