acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorBloomberg
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Ibm, At&t Build Technology to Move Data Fast in Disaster
From ACM TechNews

Ibm, At&t Build Technology to Move Data Fast in Disaster

Prototype technology can quickly move large amounts of critical data and software to another location in the event of a natural disaster or terrorist attack. 

As China Stalks Satellites, ­.S. and Japan Prepare to Defend Them
From ACM News

As China Stalks Satellites, ­.S. and Japan Prepare to Defend Them

In May 2013 the Chinese government conducted what it called a science space mission from the Xichang Satellite Launch Center in southwest China.

How Russian Hackers Stole the Nasdaq
From ACM News

How Russian Hackers Stole the Nasdaq

In October 2010, a Federal Bureau of Investigation system monitoring U.S. Internet traffic picked up an alert.

Female Cyber Sleuths Hack Into Silicon Valley's Boys Club
From ACM TechNews

Female Cyber Sleuths Hack Into Silicon Valley's Boys Club

One area of the tech world in which women are making great gains is information security, where they outnumber men in certain positions.

Hospitals Are Mining Patients' Credit Card Data to Predict Who Will Get Sick
From ACM News

Hospitals Are Mining Patients' Credit Card Data to Predict Who Will Get Sick

Imagine getting a call from your doctor if you let your gym membership lapse, make a habit of buying candy bars at the checkout counter, or begin shopping at plus...

The Bbc Doesn't Want to Be Forgotten By Google
From ACM News

The Bbc Doesn't Want to Be Forgotten By Google

Since agreeing to comply with the European Court of Justice’s decision that people have the right to be forgotten, Google has received about 50,000 requests for...

Hackers Devise Wireless Methods For Stealing Atm Users' Pins
From ACM News

Hackers Devise Wireless Methods For Stealing Atm Users' Pins

Pilfering the personal identification numbers of financial accounts, a potential jackpot for hackers, is tougher to pull off thanks to data encryption and other...

The U.s. Government Wants 6,000 New 'cyber Warriors' By 2016
From ACM Careers

The U.s. Government Wants 6,000 New 'cyber Warriors' By 2016

The Pentagon plans to triple its cybersecurity staff by 2016, U.S. Secretary of Defense Chuck Hagel announced recently.

Justice Scalia Looks Forward to Hearing Nsa Spying Case
From ACM News

Justice Scalia Looks Forward to Hearing Nsa Spying Case

Justice Antonin Scalia signaled during a law school talk on March 21 that the Supreme Court is very much aware that legal challenges to the National Security Agency's...

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers
From ACM News

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers

The tense on-the-ground standoff in Ukraine has already tipped into open hostilities online, with hackers targeting members of parliament and state agencies.

Since It Can't Sue ­s All, Getty Images Embraces Embedded Photos
From ACM News

Since It Can't Sue ­s All, Getty Images Embraces Embedded Photos

For the past decade or so, the best defense Getty Images could find against the right-click button on your mouse—home of the "copy" and "save" functions—has been...

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built
From ACM News

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built

Last year, Edward Snowden turned over to the Guardian, a British newspaper, some 58,000 classified U.S. government documents.

The Bitcoin-Mining Arms Race Heats Up
From ACM News

The Bitcoin-Mining Arms Race Heats Up

Joel Flickinger's two-bedroom home in the hills above Oakland, Calif., hums with custom-built computing gear.

Does Bitcoin Have a Future in Politics?
From ACM News

Does Bitcoin Have a Future in Politics?

Representative Steve Stockman (R-Tex.) is no stranger to provocative proposals.

The Hidden Technology That Makes Twitter Huge
From ACM News

The Hidden Technology That Makes Twitter Huge

Consider the tweet.

Nsa Surveillance Makes For Strange Bedfellows
From ACM Opinion

Nsa Surveillance Makes For Strange Bedfellows

The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...

Vending Machines Get Smart to Accommodate the Cashless
From ACM Careers

Vending Machines Get Smart to Accommodate the Cashless

More than 40 percent of U.S. adults say they can go a week without paying for something with cash, according to a survey conducted by Rasmussen Reports last year...

How Syrian Hackers Found the New York Times's Australian Weak Spot
From ACM News

How Syrian Hackers Found the New York Times's Australian Weak Spot

A hacking attack launched by the Syrian Electronic Army may have targeted the New York Timesand other U.S. media companies, but the weak link was Melbourne IT (...

How Big Data Could Help Identify the Next Felon—or Blame the Wrong Guy
From ACM Careers

How Big Data Could Help Identify the Next Felon—or Blame the Wrong Guy

Think of it as big data meets "Minority Report."

Medical Hacking Poses a Terrifying Threat, in Theory
From ACM News

Medical Hacking Poses a Terrifying Threat, in Theory

In the world of hypothetical cybercrime, not much is scarier than the hacked medical device.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account