Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Here's How Much Bots Drive Conversation During News Events
From ACM News

Here's How Much Bots Drive Conversation During News Events

Last week, as thousands of Central American migrants made their way northward through Mexico, walking a treacherous route toward the US border, talk of "the caravan...

Google Wants China. Will Chinese ­sers Want Google?
From ACM News

Google Wants China. Will Chinese ­sers Want Google?

Google CEO Sundar Pichai was upbeat Monday when he told WIRED about internal tests of a censored search engine designed to win approval from Chinese officials....

These New Tricks Can Outsmart Deepfake Videos, for Now
From ACM News

These New Tricks Can Outsmart Deepfake Videos, for Now

For weeks, computer scientist Siwei Lyu had watched his team's deepfake videos with a gnawing sense of unease.

The Ick of AI That Impersonates Humans
From ACM News

The Ick of AI That Impersonates Humans

Philip K. Dick was living a few miles north of San Francisco when he wrote Do Androids Dream of Electric Sheep?, which envisioned a world where artificially intelligent...

How Russian Spies Infiltrated Hotel Wi-Fi to Hack Victims ­p Close
From ACM News

How Russian Spies Infiltrated Hotel Wi-Fi to Hack Victims ­p Close

For years, the Kremlin's increasingly aggressive hackers have reached across the globe to hit targets with everything from simple phishing schemes to worms built...

Mobile Websites Can Tap Into Your Phone's Sensors Without Asking
From ACM News

Mobile Websites Can Tap Into Your Phone's Sensors Without Asking

When apps want to access data from your smartphone's motion or light sensors, they often make that capability clear.

Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob
From ACM News

Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob

Tesla has taken plenty of innovative steps to protect the driving systems of its kitted-out cars against digital attacks. It's hired top-notch security engineers...

The Serious Security Problem Looming Over Robotics
From ACM News

The Serious Security Problem Looming Over Robotics

They call it Herb2. It's a dapper robot, wearing a bowtie even while it sits at home in its lab at the University of Washington.

A Monitor's ­ltrasonic Sounds Can Reveal What's on the Screen
From ACM News

A Monitor's ­ltrasonic Sounds Can Reveal What's on the Screen

You probably assume that someone can only see what's on your computer screen by looking at it.

How Hacked Water Heaters Could Trigger Mass Blackouts
From ACM News

How Hacked Water Heaters Could Trigger Mass Blackouts

When the cybersecurity industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of hackers ...

In Search of New Rules to Protect Other Worlds From Earth's Cooties
From ACM News

In Search of New Rules to Protect Other Worlds From Earth's Cooties

NASA has to start protecting planets better. The international treaty governing space—there is one—and the laws and regulations that follow it date back to the...

The Unexpected Fallout of Iran's Telegram Ban
From ACM News

The Unexpected Fallout of Iran's Telegram Ban

Seven weeks after Iran's conservative-led judiciary banned the secure communications app Telegram inside the country, Iranians are still reeling from the change...

Cosmic Ray Showers Crash Supercomputers. Here's What to Do About It
From ACM News

Cosmic Ray Showers Crash Supercomputers. Here's What to Do About It

The Cray-1 supercomputer, the world's fastest back in the 1970s, does not look like a supercomputer.

Stealthy, Destructive Malware Infects Half a Million Routers
From ACM News

Stealthy, Destructive Malware Infects Half a Million Routers

Home routers have become the rats to hackers' bubonic plague: An easily infected, untreated and ubiquitous population in which dangerous digital attacks can spread...

House Democrats Release 3,500 Russia-Linked Facebook Ads
From ACM News

House Democrats Release 3,500 Russia-Linked Facebook Ads

On Thursday, Democrats on the House Intelligence Committee published more than 3,500 Facebook and Instagram ads linked to the Russian propaganda group Internet...

Cracking the Crypto War
From ACM News

Cracking the Crypto War

On December 2, 2015, a man named Syed Rizwan Farook and his wife, Tashfeen Malik, opened fire on employees of the Department of Public Health in San Bernardino,...

A Long-Awaited IoT Crisis Is Here, and Many Devices Aren't Ready
From ACM News

A Long-Awaited IoT Crisis Is Here, and Many Devices Aren't Ready

You know by now that Internet of Things devices like your router are often vulnerable to attack, the industry-wide lack of investment in security leaving the door...

The Next NSA Chief Is More ­sed to Cyberwar Than Spy Games
From ACM News

The Next NSA Chief Is More ­sed to Cyberwar Than Spy Games

After sailing through two friendly Senate hearings—one so uncontroversial that only six senators tops bothered to even show up at any given point in the hour—Lieutenant...

Facebook's New Data Restrictions Will Handcuff Even Honest Researchers
From ACM News

Facebook's New Data Restrictions Will Handcuff Even Honest Researchers

Last week, when news broke (again) that Cambridge Analytica had allegedly misused 50 million Facebook users' data, it immediately raised a difficult question: When...

Europe's New Privacy Law Will Change the Web, and More
From ACM News

Europe's New Privacy Law Will Change the Web, and More

Consumers have long wondered just what Google and Facebook know about them, and who else can access their personal data. But internet giants have little incentive...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account