acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Which Telecoms Store Your Data the Longest? Secret Memo Tells All
From ACM News

Which Telecoms Store Your Data the Longest? Secret Memo Tells All

The nation’s major mobile-phone providers are keeping a treasure trove of sensitive data on their customers, according to newly released Justice Department internal...

Feds, Eff Clash in Appeals Court Hearing on Nsa Spying
From ACM News

Feds, Eff Clash in Appeals Court Hearing on Nsa Spying

A three-judge federal appeals court grilled government and civil rights lawyers while entertaining arguments here Wednesday concerning dozens of dismissed lawsuits...

Why Has BlackBerry Been Blamed for the London Riots?
From ACM News

Why Has BlackBerry Been Blamed for the London Riots?

The whole of London is taking stock after outbreaks of violence and looting across the capital. Ealing, Camden, Peckham, Clapham, Lewisham, Woolwich, and Hackney...

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems
From ACM News

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems

A security researcher has uncovered a slew of vulnerabilities in Siemens industrial control systems, including a hard-coded password, that would let attackers...

Researchers Expose Cunning Online Tracking Service That Can
From ACM News

Researchers Expose Cunning Online Tracking Service That Can

Researchers at U.C. Berkeley have discovered that some of the net's most popular sites are using a tracking service that can't be evaded—even when users block...

Here's How U.s. Spies Will Find You Through Your Pics
From ACM News

Here's How U.s. Spies Will Find You Through Your Pics

Iarpa, the intelligence community’s way-out research shop, wants to know where you took that vacation picture over the Fourth of July. It wants to know where...

From ACM News

Document: Fbi Surveillance Geeks Fear, Love New Gadgets

Can't wait for 4G to become the ubiquitous standard for mobile communication? On the edge of your seat for the unveiling of Microsoft's secret Menlo Project and...

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells
From ACM News

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells

Vulnerabilities in electronic systems that control prison doors could allow hackers or others to spring prisoners from their jail cells, according to researchers...

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History
From ACM News

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

It was January 2010, and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz...

From ACM News

Spies Want to Mine Your Tweets For Signs of the Next Tsunami

The intelligence community has seen the future, and the future is Google Trends. Actually, more like a highly sophisticated version of Google Trends, with Twitter...

Crazy Military Tracking Tech, From Super Scents to Quantum Dots
From ACM News

Crazy Military Tracking Tech, From Super Scents to Quantum Dots

Scents that make you trackable, indoors and out. Nanocrystals that stick to your body, and light up on night-vision goggles. Miniradar that maps your location...

From ACM News

Domestic Surveillance Court Approved All 1,506 Warrant Applications in 2010

The secretive Foreign Intelligence Surveillance Court approved all 1,506 government requests to electronically monitor suspected "agents" of a foreign power or...

From ACM News

Darpa Apes Nick Fury to Map Social Networks

If the military is going to disrupt insurgent cells or understand how revolutionary movements congeal, it needs to perceive the connections between people that...

Csi Bin Laden: Commandos Use Thumb, Eye Scans to Track Terrorists
From ACM News

Csi Bin Laden: Commandos Use Thumb, Eye Scans to Track Terrorists

The U.S. forces that killed Osama bin Laden in his Abbottabad compound were more than expert marksmen. Some of them were forensics experts as well, using sophisticated...

From ACM News

'predator' Smart Camera Locks Onto, Tracks Anything

Zdenek Kalal’s Predator object-tracking software is almost uncanny. Show anything to its all-seeing camera eye, and it will quickly learn to recognize it and...

Attack Code for SCADA Vulnerabilities Released Online
From ACM News

Attack Code for SCADA Vulnerabilities Released Online

The security of critical infrastructure is in the spotlight again this week after a researcher released attack code that can exploit several vulnerabilities found...

 Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant
From ACM News

Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant

Attackers behind the Stuxnet computer worm focused on targeting five organizations in Iran that they believed would get them to their final target in that country...

­.s. Has Secret Tools to Force Internet on Dictators
From ACM News

­.s. Has Secret Tools to Force Internet on Dictators

When Hosni Mubarak shut down Egypt’s internet and cellphone communications, it seemed that all U.S. officials could do was ask him politely to change his mind...

Report: Efforts to Secure Nation
From ACM News

Report: Efforts to Secure Nation

The official government cybersecurity standards for the electric power grid fall far short of even the most basic security standards observed by noncritical industries...

Beyond Surveillance: Darpa Wants a Thinking Camera
From ACM News

Beyond Surveillance: Darpa Wants a Thinking Camera

It’s tough being an imagery analyst for the U.S. military: you’re drowning in pictures and drone video, with more pouring in endlessly from the tons of sensors...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account