acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

WikiLeaks Posts Mysterious 'Insurance' File

In the wake of strong U.S. government statements condemning WikiLeaks' recent publishing of 77,000 Afghan War documents, the secret-spilling site has posted a mysterious...

Defcon Ninja Party Badge
From ACM News

Defcon Ninja Party Badge

A hacker group known as the Ninjas has created what may be the best DefCon badge ever. The badge allows wireless ninja battle between badge holders. Unlike the...

From ACM News

Is Breaking Captcha a Crime?

Prosecutors in a New Jersey ticket scalping case are pushing the envelope on the federal computer hacking law, setting a precedent that could make it a felony to...

With World Watching, Wikileaks Falls Into Disrepair
From ACM News

With World Watching, Wikileaks Falls Into Disrepair

Would-be whistle-blowers hoping to leak documents to Wikileaks face a potentially frustrating surprise. Wikileaks’ submission process, which had been degraded for...

From ACM News

Nsa Gets Geeky After Dark, New Docs Show

It's an agency staffed by some of the government's top hackers, brainiest cryptographers, and most sophisticated network defenders. But when employees at the NSA...

From ACM News

Bill Would Give Feds 'Emergency' Powers to Secure Civilian Nets

A U.S. Senate draft bill would give the federal government the power to take over civilian networks' security, if there's an "imminent cyber threat" and provides...

Cyber Command: We Don
From ACM News

Cyber Command: We Don

Members of the military’s new Cyber Command insist that they’ve got no interest in taking over civilian Internet security--or even in becoming the Pentagon’s primary...

DARPA
From ACM News

DARPA

Software systems could one day analyze everything from blurry war-zone footage to the subtle sarcasm in a written paragraph, thanks to two unassuming scientists...

From ACM News

DARPA Wants Code to Spot

Can software spot a cyberspy’s tricky intentions, before he’s started to help the other side? The way-out researchers at Darpa think so.

From ACM News

Army Spy Plane May Have Snooped on Bomber: Report

Investigators were able to track wannabe terrorist Faisal Shahzad through his anonymous, pre-paid cell phone--exactly how, they won’t say. But there was a tantalizing...

The Legal Case For Robot War Gets Complicated
From ACM News

The Legal Case For Robot War Gets Complicated

The legal debate over America's undeclared drone war in Pakistan is getting sharper: In a congressional hearing yesterday, a prominent law professor suggested that...

Why Intel Wants to Get Into Energy
From ACM News

Why Intel Wants to Get Into Energy

Intel showed off an experimental device last week in China that could someday substantially cut the costs of wiring homes and offices for energy efficiency, one...

Networked Networks Are Prone to Epic Failure
From ACM News

Networked Networks Are Prone to Epic Failure

Networks that are resilient on their own become fragile and prone to catastrophic failure when connected, suggests a new study with troubling implications for tightly...

Security Pros Question Deployment of Smart Meters
From ACM News

Security Pros Question Deployment of Smart Meters

The country’s swift deployment of smart-grid technology has security professionals concerned that utilities and smart-meter vendors are repeating the mistakes made...

White House Cyber Czar: 'there Is No Cyberwar'
From ACM News

White House Cyber Czar: 'there Is No Cyberwar'

Howard Schmidt, the new cybersecurity czar for the Obama Administration, has a short answer for the drumbeat of rhetoric claiming the United States is caught up...

Darpa's New Plans: Crowdsource Intel, Edit Dna
From ACM TechNews

Darpa's New Plans: Crowdsource Intel, Edit Dna

The U.S. Defense Advanced Research Projects Agency's (DARPA's) future plans call for crowdsourcing military intelligence, creating an immune system for Defense...

From ACM News

Pentagon Searches For

One of the trickiest problems in cyber security is trying to figure who’s really behind an attack. Darpa, the Pentagon agency that created the Internet, is trying...

From ACM News

Darpa: U.s. Geek Shortage Is National Security Risk

Sure, we’re all plugged in and online 24/7. But fewer American kids are growing up to be bona fide computer geeks. And that poses a serious security risk for the...

From ACM News

Secret Math of Fly Eyes Could Overhaul Robot Vision

By turning the brain cell activity underlying fly eyesight into mathematical equations, researchers have found an ultra-efficient method for pulling motion patterns...

Scan of Internet ­ncovers Thousands of Vulnerable Embedded Devices
From ACM TechNews

Scan of Internet ­ncovers Thousands of Vulnerable Embedded Devices

A scan of the Internet by Columbia University researchers searching for vulnerable embedded devices has found that nearly 21,000 routers, Webcams, and VoIP products...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account