acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Leap Second Is About to Rattle the Internet. But There's a Plot to Kill It
From ACM News

The Leap Second Is About to Rattle the Internet. But There's a Plot to Kill It

The Qantas Airways computers started crashing just after midnight.

A Cyberattack Has Caused Confirmed Physical Damage For the Second Time Ever
From ACM News

A Cyberattack Has Caused Confirmed Physical Damage For the Second Time Ever

Amid all the noise the Sony hack generated over the holidays, a far more troubling cyber attack was largely lost in the chaos. Unless you follow security news closely...

Bots Now Outnumber Humans on the Web
From ACM TechNews

Bots Now Outnumber Humans on the Web

Automated code or bots currently account for 56 percent of all of website visits, and a recent analysis of 20,000 websites found bot traffic can run as high as...

Bots Now Outnumber Humans on the Web
From ACM News

Bots Now Outnumber Humans on the Web

Diogo Mónica once wrote a short computer script that gave him a secret weapon in the war for San Francisco dinner reservations.

Data From Our Wearables Is Now Courtroom Fodder
From ACM News

Data From Our Wearables Is Now Courtroom Fodder

Courtrooms typically lag in technological innovation.

An Interface For Tracking Botnets That's Fit For a Sci-Fi Starship
From ACM News

An Interface For Tracking Botnets That's Fit For a Sci-Fi Starship

What do you get when you ask a bunch of digital artists to dream up a state-of-the-art tool for fighting cybercrime?

Google Can Now Tell You're Not a Robot With Just One Click
From ACM News

Google Can Now Tell You're Not a Robot With Just One Click

When Alan Turing first conceived of the Turing Test in 1947, he suggested that a computer program’s resemblance to a human mind could be gauged by making it answer...

Hackers Gather For Cyberwar in an Intense 48-Hour Sim
From ACM Careers

Hackers Gather For Cyberwar in an Intense 48-Hour Sim

Locked Shields is among the world's preeminent cyber attack simulations.

The ­npatchable Malware That Infects ­sbs Is Now on the Loose
From ACM News

The ­npatchable Malware That Infects ­sbs Is Now on the Loose

It's been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference...

Meet Monstermind, the Nsa Bot That Could Wage Cyberwar Autonomously
From ACM TechNews

Meet Monstermind, the Nsa Bot That Could Wage Cyberwar Autonomously

Whistleblower Edward Snowden claims the U.S. National Security Agency is developing an autonomous cyberdefense system.

The Most Wanted Man in the World
From ACM News

The Most Wanted Man in the World

The message arrives on my "clean machine," a MacBook Air loaded only with a sophisticated encryption package.

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges
From ACM Careers

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges

Def Con is one of the world's biggest hacker conventions, an annual gathering of security experts, cryptographers and at least a few people who could surreptitiously...

Watch This Wireless Hack Pop a Car's Locks in Minutes
From ACM News

Watch This Wireless Hack Pop a Car's Locks in Minutes

Shims and coat hangers are the clumsy tools of last century's car burglars.

Why the Security of ­sb Is Fundamentally Broken
From ACM TechNews

Why the Security of ­sb Is Fundamentally Broken

At this week’s Black Hat security conference, security researchers will present a new proof-of-concept malware that exploits a fundamental flaw in the USB format...

The Weird Reasons Why People Make ­p False Identities on the Internet
From ACM Opinion

The Weird Reasons Why People Make ­p False Identities on the Internet

Sockpuppetry—using false identities for deception—is centuries old, but the advent of the web has made creating sockpuppets, and falling for their tricks, easier...

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud
From ACM News

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud

Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing...

The Moral Hazards and Legal Conundrums of Our Robot-Filled Future
From ACM Opinion

The Moral Hazards and Legal Conundrums of Our Robot-Filled Future

The robots are coming, and they're getting smarter.

How Google Map Hackers Can Destroy a Business at Will
From ACM Careers

How Google Map Hackers Can Destroy a Business at Will

Washington DC-area residents with a hankering for lion meat lost a valuable source of the (yes, legal) delicacy last year when a restaurant called the Serbian Crown...

The ­ltra-Simple App That Lets Anyone Encrypt Anything
From ACM News

The ­ltra-Simple App That Lets Anyone Encrypt Anything

Encryption is hard.

Could Color Wheels Make For Easier, More Secure Passwords?
From ACM News

Could Color Wheels Make For Easier, More Secure Passwords?

The password as we know it is in critical condition.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account