Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Fbi Warns That Car Hacking Is a Real Risk
From ACM News

The Fbi Warns That Car Hacking Is a Real Risk

It's been eight months since a pair of security researchers proved beyond any doubt that car hacking is more than an action movie plot device when they remotely ...

Biometrics Are Coming, Along With Serious Security Concerns
From ACM News

Biometrics Are Coming, Along With Serious Security Concerns

You're buying a pair of jeans. At the register, instead of reaching for your wallet or phone, you pull back your hair.

Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid
From ACM News

Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid

It was 3:30 p.m. last December 23, and residents of the Ivano-Frankivsk region of Western Ukraine were preparing to end their workday and head home through the...

How the Feds Could Get Into Iphones Without Apple's Help
From ACM News

How the Feds Could Get Into Iphones Without Apple's Help

It's a showdown that has the country mesmerized.

Flaws in Wireless Mice and Keyboards Let Hackers Type on Your Pc
From ACM TechNews

Flaws in Wireless Mice and Keyboards Let Hackers Type on Your Pc

Bastille researchers warn of a new hacking technique in which malefactors armed with antennas can hijack wireless keyboards and mice from seven companies.

Apple's Fbi Battle Is Complicated. Here's What's Really Going On
From ACM News

Apple's Fbi Battle Is Complicated. Here's What's Really Going On

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...

If You Go Near the Super Bowl, You Will Be Surveilled Hard
From ACM News

If You Go Near the Super Bowl, You Will Be Surveilled Hard

Super Bowl 50 will be big in every way.

How to Make Your Own Nsa Bulk Surveillance System
From ACM TechNews

How to Make Your Own Nsa Bulk Surveillance System

A network surveillance and security issues expert built a miniature bulk surveillance system like the one used by the U.S. National Security Agency.

Nsa Hacker Chief Explains How to Keep Him Out of Your System
From ACM News

Nsa Hacker Chief Explains How to Keep Him Out of Your System

It was the talk most anticipated at this year's inaugural Usenix Enigma security conference in San Francisco and one that even the other speakers were eager to...

An Easy Way For Hackers to Remotely Burn Industrial Motors
From ACM News

An Easy Way For Hackers to Remotely Burn Industrial Motors

Hacks that cause physical destruction are so rare they can be counted on one hand.

The Father of Online Anonymity Has a Plan to End the Crypto War
From ACM TechNews

The Father of Online Anonymity Has a Plan to End the Crypto War

David Chaum, who has invented many cryptographic protocols, has developed an encryption scheme for secret, anonymous communications. 

How the Internet of Things Got Hacked
From ACM News

How the Internet of Things Got Hacked

There was once a time when people distinguished between cyberspace, the digital world of computers and hackers, and the flesh-and-blood reality known as meatspace...

Nobody Knew How Big a Deal the Cloud Would Be—they Do Now
From ACM News

Nobody Knew How Big a Deal the Cloud Would Be—they Do Now

Ten years ago, Amazon unleashed a technology that we now call, for better or for worse, cloud computing.

The Secret History of World War Ii-Era Drones
From ACM News

The Secret History of World War Ii-Era Drones

Drones are the hallmark of tech-y modern warfare, but weapons piloted from afar have been around for more than a century.  

Hacker Lexicon: Malvertising, the Hack That Infects Computers Without a Click
From ACM News

Hacker Lexicon: Malvertising, the Hack That Infects Computers Without a Click

Malvertising is when hackers buy ad space on a legitimate website, and, as the name suggests, upload malicious advertisements designed to hack site visitor’s computers...

Medical Devices That Are Vulnerable to Life-Threatening Hacks
From ACM News

Medical Devices That Are Vulnerable to Life-Threatening Hacks

When you think about the Internet of Things, you probably think of smart refrigerators and smart electric meters, not smart pacemakers, insulin pumps, and x-ray...

Isis' Opsec Manual Reveals How It Handles Cybersecurity
From ACM News

Isis' Opsec Manual Reveals How It Handles Cybersecurity

In the wake of the Paris attacks, US government officials have been vocal in their condemnation of encryption, suggesting that US companies like Apple and Google...

Court Says Tracking Web Histories Can Violate Wiretap Act
From ACM News

Court Says Tracking Web Histories Can Violate Wiretap Act

Federal courts have long given the government leeway to surveil and collect so-called "non-content" data—records of the senders and recipients of calls and emails...

Baidu, the 'chinese Google,' Is Teaching AI to Spot Malware
From ACM News

Baidu, the 'chinese Google,' Is Teaching AI to Spot Malware

Andrew Ng picks up his iPhone and opens an app called FaceYou.

Tor Just Launched the Easiest App Yet For Anonymous, Encrypted Im
From ACM News

Tor Just Launched the Easiest App Yet For Anonymous, Encrypted Im

The anonymity network Tor has long been the paranoid standard for privacy online, and the Tor Browser that runs on it remains the best way to use the web while...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account