acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Idaho Lab in a Race to Shore Up Critical Infrastructure Systems
From ACM News

Idaho Lab in a Race to Shore Up Critical Infrastructure Systems

All it took was one click of a mouse from the CEO of the ACME Chemical company.

Army Tracking Plan: Drones That Never Forget a Face
From ACM News

Army Tracking Plan: Drones That Never Forget a Face

Perhaps the idea of spy drones already makes your nervous. Maybe you’re uncomfortable with the notion of an unblinking, robotic eye in the sky that can watch...

Supreme Court Docket: Surveillance, Profanity, and Thought Patents
From ACM News

Supreme Court Docket: Surveillance, Profanity, and Thought Patents

The Supreme Court’s 2011–2012 term began Oct. 3 with arguments on the docket concerning everything from television profanity to warrantless GPS surveillance.

Which Telecoms Store Your Data the Longest? Secret Memo Tells All
From ACM News

Which Telecoms Store Your Data the Longest? Secret Memo Tells All

The nation’s major mobile-phone providers are keeping a treasure trove of sensitive data on their customers, according to newly released Justice Department internal...

Feds, Eff Clash in Appeals Court Hearing on Nsa Spying
From ACM News

Feds, Eff Clash in Appeals Court Hearing on Nsa Spying

A three-judge federal appeals court grilled government and civil rights lawyers while entertaining arguments here Wednesday concerning dozens of dismissed lawsuits...

Why Has BlackBerry Been Blamed for the London Riots?
From ACM News

Why Has BlackBerry Been Blamed for the London Riots?

The whole of London is taking stock after outbreaks of violence and looting across the capital. Ealing, Camden, Peckham, Clapham, Lewisham, Woolwich, and Hackney...

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems
From ACM News

Hard-Coded Password and Other Security Holes Found in Siemens Control Systems

A security researcher has uncovered a slew of vulnerabilities in Siemens industrial control systems, including a hard-coded password, that would let attackers...

Researchers Expose Cunning Online Tracking Service That Can
From ACM News

Researchers Expose Cunning Online Tracking Service That Can

Researchers at U.C. Berkeley have discovered that some of the net's most popular sites are using a tracking service that can't be evaded—even when users block...

Here's How U.s. Spies Will Find You Through Your Pics
From ACM News

Here's How U.s. Spies Will Find You Through Your Pics

Iarpa, the intelligence community’s way-out research shop, wants to know where you took that vacation picture over the Fourth of July. It wants to know where...

From ACM News

Document: Fbi Surveillance Geeks Fear, Love New Gadgets

Can't wait for 4G to become the ubiquitous standard for mobile communication? On the edge of your seat for the unveiling of Microsoft's secret Menlo Project and...

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells
From ACM News

Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells

Vulnerabilities in electronic systems that control prison doors could allow hackers or others to spring prisoners from their jail cells, according to researchers...

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History
From ACM News

How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History

It was January 2010, and investigators with the International Atomic Energy Agency had just completed an inspection at the uranium enrichment plant outside Natanz...

From ACM News

Spies Want to Mine Your Tweets For Signs of the Next Tsunami

The intelligence community has seen the future, and the future is Google Trends. Actually, more like a highly sophisticated version of Google Trends, with Twitter...

Crazy Military Tracking Tech, From Super Scents to Quantum Dots
From ACM News

Crazy Military Tracking Tech, From Super Scents to Quantum Dots

Scents that make you trackable, indoors and out. Nanocrystals that stick to your body, and light up on night-vision goggles. Miniradar that maps your location...

From ACM News

Domestic Surveillance Court Approved All 1,506 Warrant Applications in 2010

The secretive Foreign Intelligence Surveillance Court approved all 1,506 government requests to electronically monitor suspected "agents" of a foreign power or...

From ACM News

Darpa Apes Nick Fury to Map Social Networks

If the military is going to disrupt insurgent cells or understand how revolutionary movements congeal, it needs to perceive the connections between people that...

Csi Bin Laden: Commandos Use Thumb, Eye Scans to Track Terrorists
From ACM News

Csi Bin Laden: Commandos Use Thumb, Eye Scans to Track Terrorists

The U.S. forces that killed Osama bin Laden in his Abbottabad compound were more than expert marksmen. Some of them were forensics experts as well, using sophisticated...

From ACM News

'predator' Smart Camera Locks Onto, Tracks Anything

Zdenek Kalal’s Predator object-tracking software is almost uncanny. Show anything to its all-seeing camera eye, and it will quickly learn to recognize it and...

Attack Code for SCADA Vulnerabilities Released Online
From ACM News

Attack Code for SCADA Vulnerabilities Released Online

The security of critical infrastructure is in the spotlight again this week after a researcher released attack code that can exploit several vulnerabilities found...

 Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant
From ACM News

Report: Stuxnet Hit 5 Gateway Targets on Its Way to Iranian Plant

Attackers behind the Stuxnet computer worm focused on targeting five organizations in Iran that they believed would get them to their final target in that country...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account