acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Most Malware Tied to 'pay-Per-Install' Market
From ACM TechNews

Most Malware Tied to 'pay-Per-Install' Market

Researchers have found that most personal computers that get infected with malware were targeted by pay-per-install services, which charge hacking gangs up to $180...

Making the Case For Security
From ACM News

Making the Case For Security

Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....

What Bitcoin Is, and Why It Matters
From ACM News

What Bitcoin Is, and Why It Matters

Recent weeks have been exciting for a relatively new kind of currency speculator. In just three weeks, the total value of a unique new digital currency called...

Tracking How Mobile Apps Track You
From ACM News

Tracking How Mobile Apps Track You

Third-party apps are the weakest link in user privacy on smart phones. They often get access to large quantities of user data, and there are few rules covering...

The Next Big Thing in Analytics: Tracking Your Cursor's Every Move
From ACM News

The Next Big Thing in Analytics: Tracking Your Cursor's Every Move

Media, search engines, advertisers and social networks have been tracking what you click since the birth of the Web, but this measurement yields an incomplete...

Failure Cascading Through the Cloud
From ACM News

Failure Cascading Through the Cloud

Two major cloud computing services, Amazon's Elastic Compute Cloud and Sony's PlayStation Network, recently suffered extended outages. Though the circumstances...

App-Specific Processors to Fight Dark Silicon
From ACM TechNews

App-Specific Processors to Fight Dark Silicon

University of California, San Diego researchers working on the GreenDroid project have developed software that scans the Android operating system and its most popular...

How People Broadcast Their Locations Without Meaning To
From ACM News

How People Broadcast Their Locations Without Meaning To

Smartphones include geotagging features many people aren't aware of.

Microsoft Browser Would Offer Personalization Along With Privacy Protection
From ACM TechNews

Microsoft Browser Would Offer Personalization Along With Privacy Protection

Microsoft researchers have developed RePriv, a browser that analyzes users' online behavior and controls how their personal information is released to sites that...

From ACM News

The Botnets That Won't Die

New communications schemes could make zombie PC networks far more difficult to shut down.

Busting the Botnets
From ACM News

Busting the Botnets

They're the scourge of the Internet—networks containing thousands or even millions of virus-infected, remote-controlled PCs. These so-called "botnets" send out...

From ACM News

Social Search, Without a Social Network

Google may be built on an algorithm for taming the Web, but yesterday the company added social features that will let your friends help determine what ranks high...

How Cruise Missiles Would Beat Gps Jammers in Libya
From ACM News

How Cruise Missiles Would Beat Gps Jammers in Libya

Now that jammers are cheap and potentially ubiquitous, how do Tomahawk missiles stay on course?

Taking Control of Cars From Afar
From ACM News

Taking Control of Cars From Afar

Researchers who have spent the last two years studying the security of car computer systems have revealed that they can take control of vehicles wirelessly.

Spotting Virtual Intruders
From ACM News

Spotting Virtual Intruders

Handing sensitive data over to a cloud computing provider makes many companies skittish. But new software, called HomeAlone, could help them come to terms with...

From ACM TechNews

Giving Hackers a Printed Invitation

At the Shmoocon conference, researchers demonstrated how hackers are using printers to infiltrate corporate computer networks. Printers are "totally integrated...

Car Theft by Antenna
From ACM TechNews

Car Theft by Antenna

A method for breaking into and stealing cars that have keyless entry and starting systems has been found by ETH Zurich researchers, who were able to gain entry...

From ACM TechNews

'sms of Death' Could Crash Many Mobile Phones

Low-end mobile phones are vulnerable to hackers using short message service (SMS) communications, according to research presented at a recent conference in Germany...

The Brainy Learning Algorithms of Numenta
From ACM News

The Brainy Learning Algorithms of Numenta

How the inventor of the PalmPilot studied the workings of the human brain to help companies turn a deluge of data into business intelligence.

Raising a Botnet in Captivity
From ACM News

Raising a Botnet in Captivity

Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account