Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Biohackers Encoded Malware in a Strand of Dna
From ACM News

Biohackers Encoded Malware in a Strand of Dna

When biologists synthesize DNA, they take pains not to create or spread a dangerous stretch of genetic code that could be used to create a toxin or, worse, an infectious...

To Fix Voting Machines, Hackers Tear Them Apart
From ACM News

To Fix Voting Machines, Hackers Tear Them Apart

The toughest thing to convey to newcomers at the DefCon Voting Village in Las Vegas this weekend? Just how far they could go with hacking voting machines set up...

New Nasa Tech Kills Trespassing Drones Without Touching Them
From ACM News

New Nasa Tech Kills Trespassing Drones Without Touching Them

In the most nightmarish drone scenarios, one of the little whirlybirds flies into an airliner, or wanders into military airspace, or swoops down on the White House...

Two Giants of AI Team ­p to Head Off the Robot Apocalypse
From ACM News

Two Giants of AI Team ­p to Head Off the Robot Apocalypse

There's nothing new about worrying that superintelligent machines may endanger humanity, but the idea has lately become hard to avoid.

How an Entire Nation Became Russia's Test Lab For Cyberwar
From ACM News

How an Entire Nation Became Russia's Test Lab For Cyberwar

The clocks read zero when the lights went out.

Everything We Know About Russia's Election-Hacking Playbook
From ACM News

Everything We Know About Russia's Election-Hacking Playbook

Just when the cybersecurity world thinks it's found the limits of how far Russian hackers will go to meddle in foreign elections, a new clue emerges that suggests...

Russian Hackers Are ­sing 'tainted' Leaks to Sow Disinformation
From ACM News

Russian Hackers Are ­sing 'tainted' Leaks to Sow Disinformation

Over the past year, the Kremlin's strategy of weaponizing leaks to meddle with democracies around the world has become increasingly clear, first in the US and more...

Watch Hackers Sabotage an Industrial Robot Arm
From ACM News

Watch Hackers Sabotage an Industrial Robot Arm

When the cybersecurity industry warns of digital threats to the "internet of things," the targets that come to mind are ill-conceived, insecure consumer products...

Inside the Hunt For Russia's Most Notorious Hacker
From ACM News

Inside the Hunt For Russia's Most Notorious Hacker

On the morning of December 30, the day after Barack Obama imposed sanctions on Russia for interfering in the 2016 US election, Tillmann Werner was sitting down...

What If Quantum Computers ­sed Hard Drives Made of Dna?
From ACM News

What If Quantum Computers ­sed Hard Drives Made of Dna?

You've heard the hype: The quantum computer revolution is coming. Physicists say these devices will be fast enough to break every encryption method banks use today...

How the Cia's Hacking Hoard Makes Everyone Less Secure
From ACM News

How the Cia's Hacking Hoard Makes Everyone Less Secure

When Wikileaks yesterday released a trove of documents purporting to show how the CIA hacks everything from smartphones to PCs to smart televisions, the agency's...

Medical Devices Are the Next Security Nightmare
From ACM News

Medical Devices Are the Next Security Nightmare

Hacked medical devices make for scary headlines.

Malware Lets a Drone Steal Data By Watching a Computer's Blinking Led
From ACM News

Malware Lets a Drone Steal Data By Watching a Computer's Blinking Led

A few hours after dark one evening earlier this month, a small quadcopter drone lifted off from the parking lot of Ben-Gurion University in Beersheba, Israel.

A Chip Flaw Strips Away Hacking Protections For Millions of Devices
From ACM TechNews

A Chip Flaw Strips Away Hacking Protections For Millions of Devices

The VUSec team at the Free University of Amsterdam in the Netherlands has demonstrated an exploit that undercuts a basic safeguard used in all modern operating...

For the Next Election, Don't Recount the Vote. Encrypt It
From ACM News

For the Next Election, Don't Recount the Vote. Encrypt It

Let's be honest: The 2016 election wasn’t a sterling display of American democracy.

Monero, the Drug Dealer's Cryptocurrency of Choice, Is on Fire
From ACM News

Monero, the Drug Dealer's Cryptocurrency of Choice, Is on Fire

For the cryptocurrency community, 2016 was a very good year.

Darpa's Off-Roaders Ditch Windows For a Digital World View
From ACM News

Darpa's Off-Roaders Ditch Windows For a Digital World View

Autonomous warriors may dominate the battlefield of tomorrow, but even those that still require human flesh will take on a robotic sheen. That shift could start...

The Year Encryption Won
From ACM News

The Year Encryption Won

Between the revelations of mega-hacks of Yahoo and others, Russia's meddling in the US electoral system, and the recent spike in ransomware, it's easy to look at...

Hacker Lexicon: What Is Perfect Forward Secrecy?
From ACM News

Hacker Lexicon: What Is Perfect Forward Secrecy?

Encryption keeps your secrets, until it doesn't.

How Humans Can Force the Machines to Play Fair
From ACM News

How Humans Can Force the Machines to Play Fair

Cynthia Dwork is best known for inventing "differential privacy," a set of techniques that safeguard the privacy of individuals in a large database.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account