acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectLegal Aspects
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


'freak' Flaw Undermines Security For Apple and Google Users, Researchers Discover
From ACM TechNews

'freak' Flaw Undermines Security For Apple and Google Users, Researchers Discover

Companies and government agencies are scrambling to correct a major security flaw revealed this week. 

What 'the Imitation Game' Didn't Tell You About Turing's Greatest Triumph
From ACM Opinion

What 'the Imitation Game' Didn't Tell You About Turing's Greatest Triumph

Freeman Dyson, 91, the famed physicist, author and oracle of human destiny, is holding forth after tea-time one February afternoon in the common room of the Institute...

Senator: Your Futuristic Car Is Putting Your Privacy and Security At Risk
From ACM News

Senator: Your Futuristic Car Is Putting Your Privacy and Security At Risk

Cars these days have more in common with smart phones than the Model-T. But a new reportfrom Sen. Ed Markey (D-Mass.) warns that the increasing technical complexity...

Crowdsourcing America's Cybersecurity Is an Idea So Crazy It Might Just Work
From ACM TechNews

Crowdsourcing America's Cybersecurity Is an Idea So Crazy It Might Just Work

Crowdsourced cybersecurity is gaining ground. 

Associated Press Looks to Expand Its Automated Stories Program Following Successful Launch
From ACM News

Associated Press Looks to Expand Its Automated Stories Program Following Successful Launch

In the last three months of 2014, the Associated Press published 3,000 articles on the earning reports of U.S. companies. Previously it could publish only 300.

Robots Are Sneaking ­p On Congress (along with Four Other Tech Trends)
From ACM Opinion

Robots Are Sneaking ­p On Congress (along with Four Other Tech Trends)

One of the best Twitter accounts inside the Beltway or out—belongs to former representativeJohn Dingell (D-Mich.), who announced his retirement with self-effacing...

A Q&a With the Hackers Who Say They Helped Break Into Sony's Network
From ACM Opinion

A Q&a With the Hackers Who Say They Helped Break Into Sony's Network

Lizard Squad. That's the hacker group whose name is suddenly on everyone's lips after it took credit for ruining Christmas for PlayStation and Xbox gamers everywhere...

Supreme Court Case Tests the Limits of Free Speech on Facebook and Other Social Media
From ACM News

Supreme Court Case Tests the Limits of Free Speech on Facebook and Other Social Media

About a week after Tara Elonis persuaded a judge to issue a protective order against her estranged husband, Anthony, her soon-to-be ex had this to say: "Fold up...

U.S., European Authorities Strike Against Internet's Black Markets
From ACM TechNews

U.S., European Authorities Strike Against Internet's Black Markets

U.S. and European law enforcement agencies last week launched a massive, coordinated strike on the so-called Dark Web.

Verizon, At&t Tracking Their Users with 'supercookies'
From ACM News

Verizon, At&t Tracking Their Users with 'supercookies'

Verizon and AT&T have been quietly tracking the Internet activity of more than 100 million cellular customers with what critics have dubbed "supercookies"—markers...

Cyberattacks Trigger Talk of 'hacking Back'
From ACM TechNews

Cyberattacks Trigger Talk of 'hacking Back'

The continuing cyberattacks on U.S. corporate networks is spurring talk among some executives and government officials of going on the offensive, or "hacking back...

The Ethics of Hacking 101
From ACM TechNews

The Ethics of Hacking 101

Some of the U.S.'s most prestigious cybersecurity university programs make a point of teaching their students offensive skills, but in doing so also must address...

Protesters in Hong Kong Must Weigh the Promise and Risks of Mesh Networking
From ACM News

Protesters in Hong Kong Must Weigh the Promise and Risks of Mesh Networking

In the heart of Hong Kong, where the largest pro-Democracy protest to challenge Beijing since the 1989 Tiananmen Square gathering has been brewing, some protesters...

Why the ­.S. Might Just Need a Federal Commission on Robots
From ACM TechNews

Why the ­.S. Might Just Need a Federal Commission on Robots

A Federal Robot Commission could help extract sense and insight from the many technological applications that separate human agency from execution.

So You Want to Hack Apple Pay?
From ACM News

So You Want to Hack Apple Pay?

A decade ago, a group of Johns Hopkins University grad students tried to hack one of the first commercially popular Near Field Communication payment systems—the...

For Sale: Systems that Can Secretly Track Where Cellphone ­sers Go Around the Globe
From ACM News

For Sale: Systems that Can Secretly Track Where Cellphone ­sers Go Around the Globe

Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they...

For Sale: Systems That Can Secretly Track Where Cellphone ­sers Go Around the Globe
From ACM TechNews

For Sale: Systems That Can Secretly Track Where Cellphone ­sers Go Around the Globe

Privately owned surveillance companies are offering systems capable of tracking the location of any cellphone user to governments around the globe. 

Why Teaching Grandmothers to Code Isn't a Crazy Idea
From ACM TechNews

Why Teaching Grandmothers to Code Isn't a Crazy Idea

The same efforts to teach youngsters coding and entrepreneurship should be extended to older workers and retired people, writes Stanford University fellow Vivek...

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone
From ACM Opinion

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone

In the computer and network security industry, few people are as well known as Dan Geer.

How Spy Agencies Keep Their 'toys' from Law Enforcement
From ACM News

How Spy Agencies Keep Their 'toys' from Law Enforcement

A little over a decade ago, federal prosecutors used keystroke logging software to steal the encryption password of an alleged New Jersey mobster, Nicodemo Scarfo...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account