Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Log In to Your Phone with a Finger-Drawn Doodle Instead of a Password
From ACM News

Log In to Your Phone with a Finger-Drawn Doodle Instead of a Password

Rather than painstakingly typing in passwords on your smartphone, you may eventually just swipe a shape or other pattern on its display to authenticate yourself...

What Role Should Silicon Valley Play in Fighting Terrorism?
From ACM Careers

What Role Should Silicon Valley Play in Fighting Terrorism?

On Friday, January 8, several high-level officials from the Obama administration—including the attorney general, the White House chief of staff, and the directors...

You've Been Misled About What Makes a Good Password
From ACM TechNews

You've Been Misled About What Makes a Good Password

Symantec researchers recently found requiring numbers and uppercase characters in passwords does not do much to make them stronger. 

Why Self-Driving Cars Must Be Programmed to Kill
From ACM News

Why Self-Driving Cars Must Be Programmed to Kill

When it comes to automotive technology, self-driving cars are all the rage.

Fighting Isis Online
From ACM Opinion

Fighting Isis Online

The two men pecked out messages on opposite sides of the country.

First Detailed Public Map of ­.s. Internet Backbone Could Make It Stronger
From ACM News

First Detailed Public Map of ­.s. Internet Backbone Could Make It Stronger

It may not look like much at first glance, but a map created by University of Wisconsin computer science professor Paul Barford and about a dozen colleagues took...

How International Monitors Spot Nukes and Other Rumblings
From ACM News

How International Monitors Spot Nukes and Other Rumblings

The ultimate nightmare for critics of the Iran nuclear deal being debated in Congress is that somehow, despite the agreement and all its built-in safeguards, Iran...

Tool Makes It Easier to Evade Online Censors
From ACM TechNews

Tool Makes It Easier to Evade Online Censors

A new tool could offer a way around censorship technologies enabled by repressive governments.

Tool Makes It Easier to Evade Online Censors
From ACM News

Tool Makes It Easier to Evade Online Censors

After the huge chemical explosion in Tianjin, China, this month, two cleanup efforts began.

Bitcoin's Dark Side Could Get Darker
From ACM TechNews

Bitcoin's Dark Side Could Get Darker

Programs that can confirm data and hold or use funds could help enable an insidious dimension of cryptocurrency's criminalization, according to newly released research...

Teaching Machines to ­nderstand ­S
From ACM News

Teaching Machines to ­nderstand ­S

The first time Yann LeCun revolutionized artificial intelligence, it was a false dawn.

Securing Today's Data Against Tomorrow's Quantum Computers
From ACM TechNews

Securing Today's Data Against Tomorrow's Quantum Computers

Microsoft researchers consider it vital for encryption upgrades to be developed now, to anticipate quantum computing's decryption potential.

Military Robots: Armed, But How Dangerous?
From ACM News

Military Robots: Armed, But How Dangerous?

An open letter calling for a ban on lethal weapons controlled by artificially intelligent machines was signed last week by thousands of scientists and technologists...

How Ads Follow You from Phone to Desktop to Tablet
From ACM News

How Ads Follow You from Phone to Desktop to Tablet

Imagine you slack off at work and read up online about the latest Gibson 1959 Les Paul electric guitar replica.

The Real Software Security Problem Is ­S
From ACM TechNews

The Real Software Security Problem Is ­S

There are simple steps that can be taken to make software more secure and resilient, writes Carnegie Mellon University professor Jean Yang. 

Smartphone Secrets May Be Better Than a Password
From ACM News

Smartphone Secrets May Be Better Than a Password

Before you read this story, try to answer the following question: Who was the first person to text you today?

Security Experts Hack Teleoperated Surgical Robot
From ACM TechNews

Security Experts Hack Teleoperated Surgical Robot

University of Washington in Seattle researchers are studying the issues associated with the communications technology involved in telesurgery. 

White House and Department of Homeland Security Want a Way Around Encryption
From ACM News

White House and Department of Homeland Security Want a Way Around Encryption

The White House and U.S. Department of Homeland Security officials support arguments by the nation’s law enforcement and intelligence leaders that encryption technology...

How Benford's Law Reveals Suspicious Activity on Twitter
From ACM News

How Benford's Law Reveals Suspicious Activity on Twitter

Back in the 1880s, the American astronomer Simon Newcomb noticed something strange about the book of logarithmic tables in his library—the earlier pages were much...

3 Questions on Killer Robots
From ACM Opinion

3 Questions on Killer Robots

Delegates to the United Nations Convention on Certain Conventional Weapons are meeting this week in Geneva to discuss fully autonomous weapons—machines that could...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account