Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorThe Wall Street Journal

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Feds Shift Tracking Defense
From ACM News

Feds Shift Tracking Defense

The U.S. Department of Justice now says its use of a cellphone-tracking device in a controversial Arizona case could be considered a "search" under the Fourth...

From ACM News

What to Do If You've Been Hacked

It's a nightmare scenario every business fears. Your tech department has spotted suspicious activity on the company network. Your customers and employees are...

'stingray' Phone Tracker Fuels Constitutional Clash
From ACM News

'stingray' Phone Tracker Fuels Constitutional Clash

For more than a year, federal authorities pursued a man they called simply "the Hacker." Only after using a little known cellphone-tracking device—a stingray—were...

From ACM News

Cisco Poised to Help China Keep an Eye on Its Citizens

Western companies, including Cisco Systems Inc., are poised to help build an ambitious new surveillance project in China—a citywide network of as many as 500,000...

From ACM News

Google Takes On Friend Sprawl

Google Inc. launched its most ambitious social-networking effort yet, broadening a battle with Facebook Inc. to grab the attention of Web users and future advertising...

The Cop on the Cyber Beat
From ACM Opinion

The Cop on the Cyber Beat

Homeland Security's Bruce McConnell on the government's role in helping companies fight online attacks.

Firms Adjust to Hacks
From ACM News

Firms Adjust to Hacks

When email-marketing firm Epsilon Data Management discovered in March that hackers had stolen consumer email addresses it maintains for major banks and retailers...

Security 'tokens' Take Hit
From ACM News

Security 'tokens' Take Hit

RSA Security is offering to provide security monitoring or replace its well-known SecurID tokens—devices used by millions of corporate workers to securely log...

Chefs Who Spy? Tracking Google's Hackers in China
From ACM News

Chefs Who Spy? Tracking Google's Hackers in China

From this city of six million, Shandong Lanxiang Vocational School quietly churns out 30,000 mechanics, barbers, and welders each year. One of its triumphs was...

From ACM News

Cyber Combat: Act of War

The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for...

Sony Ceo Warns of 'bad New World'
From ACM News

Sony Ceo Warns of 'bad New World'

After spending weeks to resolve a massive Internet security breach, Sony Corp. Chief Executive Howard Stringer said he can't guarantee the security of the company's...

From ACM News

Sec Is Pressed on Firms' Disclosures of Cyberattacks

A group of U.S. lawmakers wants the Securities and Exchange Commission to push companies to disclose when they have fallen victim to cyberattacks.

The Really Smart Phone
From ACM News

The Really Smart Phone

Researchers are harvesting a wealth of intimate detail from our cellphone data, uncovering the hidden patterns of our social lives, travels, risk of disease—even...

Facebook Shares Server Design
From ACM News

Facebook Shares Server Design

Facebook Inc. said it would share details for its new server systems and computer rooms with other companies, hoping to set off what it characterized as an open...

Tv's Next Wave: Tuning In to You
From ACM News

Tv's Next Wave: Tuning In to You

The television is channeling you. Data-gathering firms and technology companies are aggressively matching people's TV-viewing behavior with other personal data—in...

Billboards Join Wired Age
From ACM News

Billboards Join Wired Age

Billboards and posters are one of world's oldest forms of advertising. Now, some marketers and start-ups say wireless technology could revamp outdoor advertising...

Google Executive Emerges as Key Figure in Revolt
From ACM News

Google Executive Emerges as Key Figure in Revolt

More than a week after his mysterious disappearance in Egypt, Google executive and political activist Wael Ghonim will be released from government detention on...

From ACM News

Qualified Success Claimed Against Computer Worm

Cybersecurity experts combating the Conficker worm claimed qualified success but said millions of computers world-wide were still infected by the malicious software...

Algorithms Take Control of Wall Street
From ACM News

Algorithms Take Control of Wall Street

Last spring, Dow Jones launched a new service called Lexicon, which sends real-time financial news to professional investors. This in itself is not surprising...

Why Are Health Data Leaking Online? Bad Software, Study Says
From ACM TechNews

Why Are Health Data Leaking Online? Bad Software, Study Says

A recent Dartmouth College study found that sensitive health care data is being leaked online through peer-to-peer (P2P) file-sharing services. In addition, the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account