Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How to Make Smart Watches Not Worth Stealing
From ACM TechNews

How to Make Smart Watches Not Worth Stealing

A prototype device can identify someone by measuring the electrical resistance of tissues within the person's wrist. 

Statistical Tricks Extract Sensitive Data From Encrypted Communications
From ACM TechNews

Statistical Tricks Extract Sensitive Data From Encrypted Communications

Private information can be obtained from encrypted communications using a technique known as traffic analysis to find patterns in the data stream. 

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage
From ACM Opinion

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage

Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers...

Do We Need Asimov's Laws?
From ACM News

Do We Need Asimov's Laws?

In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...

World's First Covert Communications System With Camouflage Guaranteed
From ACM TechNews

World's First Covert Communications System With Camouflage Guaranteed

Researchers say they have developed a method to camouflage messages in a way that is mathematically guaranteed.

How Anybody Can Measure Your Computer's Wi-Fi Fingerprint
From ACM TechNews

How Anybody Can Measure Your Computer's Wi-Fi Fingerprint

Computer security experts have discovered a method of uniquely identifying a computer by the way it accesses Wi-Fi resources. 

Increasingly, Robots of All Sizes Are Human Workmates
From ACM News

Increasingly, Robots of All Sizes Are Human Workmates

Most industrial robots are far less friendly than the Roomba robot vacuum cleaner, which is safe enough to be a surprisingly popular means of feline transportation...

10 Breakthrough Technologies 2014
From ACM News

10 Breakthrough Technologies 2014

Technology news is full of incremental developments, but few of them are true milestones.

Three Questions For Eugene Kaspersky
From ACM Opinion

Three Questions For Eugene Kaspersky

The Moscow-based computer security firm Kaspersky Lab has analyzed major new kinds of malware, including Stuxnet, which four years ago was revealed to have damaged...

Microsoft Builds a Digital 'monkey' to Hunt Fraudulent Ads
From ACM TechNews

Microsoft Builds a Digital 'monkey' to Hunt Fraudulent Ads

Researchers have developed technology, known as a digital monkey, that can detect and counter fraudulent advertisements on a large scale. 

Pay with Your Fingerprint
From ACM News

Pay with Your Fingerprint

Anyone with an iPhone 5 can use its fingerprint reader to unlock the device and pay for apps or music in Apple's iTunes store.

Spinoffs from Spyland
From ACM News

Spinoffs from Spyland

It takes more than a little tradecraft to spin off a startup from the National Security Agency.

Facebook Creates Software That Matches Faces Almost as Well as You Do
From ACM News

Facebook Creates Software That Matches Faces Almost as Well as You Do

Asked whether two unfamiliar photos of faces show the same person, a human being will get it right 97.53 percent of the time.

Mathematical Proof Reveals How To Make The Internet More Earthquake-Proof
From ACM News

Mathematical Proof Reveals How To Make The Internet More Earthquake-Proof

One of the common myths about the Internet is that it was originally designed during the Cold War to survive nuclear attack.

Marginally ­seful
From ACM News

Marginally ­seful

Bitcoin, a purely digital currency, is backed by no commodity and governed by no central bank, but it exists because a small number of humans have chosen to believe...

'honey Encryption' Will Bamboozle Attackers With Fake Secrets
From ACM TechNews

'honey Encryption' Will Bamboozle Attackers With Fake Secrets

Researchers have developed an approach to cryptography that makes it difficult for hackers to determine when they have correctly deciphered a password.

'honey Encryption' Will Bamboozle Attackers with Fake Secrets
From ACM News

'honey Encryption' Will Bamboozle Attackers with Fake Secrets

Ari Juels, an independent researcher who was previously chief scientist at computer security company RSA, thinks something important is missing from the cryptography...

Not Ok, Glass
From ACM TechNews

Not Ok, Glass

PlaceAvoider is software that uses computer-vision techniques to identify potentially confidential or embarrassing pictures taken with new devices such as Google...

How To Track Vehicles Using Speed Data Alone
From ACM News

How To Track Vehicles Using Speed Data Alone

Location is a key indicator of personal travel patterns and habits.

Diagnosis For Healthcare.gov: ­nrealistic Technology Expectations
From ACM Opinion

Diagnosis For Healthcare.gov: ­nrealistic Technology Expectations

The fiasco with the $600 million federal health insurance website wasn't all bureaucratic.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account