acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Preventing Smart-Phone Armageddon
From ACM TechNews

Preventing Smart-Phone Armageddon

Attacks against smartphones are likely to proliferate because of their growing ubiquity and the sensitive information they carry. However, researchers believe...

Taking Over a Car
From ACM News

Taking Over a Car

Researchers "break in" with software and a laptop.

What Does 'p vs. Np' Mean For the Rest of Us?
From ACM News

What Does 'p vs. Np' Mean For the Rest of Us?

A proposed "proof" is probably a bust—but even failed attempts can advance computer science.

Mobile Flaw Could Cloak Clicks
From ACM TechNews

Mobile Flaw Could Cloak Clicks

Stanford University researchers have found that mobile websites are extremely vulnerable to attacks from malicious sites using a technique known as tapjacking,...

From ACM News

A Sidewalk Disappearing Act

Automatically removing people from street-level imagery could help prevent privacy complaints.

Wireless Car Sensors Vulnerable to Hackers
From ACM News

Wireless Car Sensors Vulnerable to Hackers

Hackers could "hijack" the wireless pressure sensors built into many cars' tires, researchers have found. Criminals might then track a vehicle or force its electronic...

Wikileaks Backlash Could Mean Less Data For Soldiers
From ACM News

Wikileaks Backlash Could Mean Less Data For Soldiers

Information shared with troops may be restricted.

Hacking the Smart Grid
From ACM News

Hacking the Smart Grid

The hurried deployment of smart-grid technology could leave critical infrastructure and private homes vulnerable to hackers. Security experts at the Black Hat...

From ACM News

The Hunt For the Wikileaks Whistle-Blower

Attorney General Eric Holder's new probe into Wikileaks's posting of 91,000 war documents will likely find that tracing the path of the documents back through the...

From ACM News

So Many Bugs, So Little Time

Tools that find serious bugs automatically could lead to safer, more stable software.

Passwords that Are Simple
From ACM News

Passwords that Are Simple

Researchers at Microsoft have come up with a way to create easy-to-remember passwords without making a system more vulnerable to hackers.

Nanoscale Random Number Circuit to Secure Future Chips
From ACM TechNews

Nanoscale Random Number Circuit to Secure Future Chips

Intel engineers have created computer processors with circuits capable of random behavior, a development that could lead to secure cryptography keys.

From ACM News

Computing with Secrets, but Keeping them Safe

A novel technique could see future Web services work with sensitive data without ever being able to read it. Several implementations of a mathematical proof unveiled...

New Cyber Chief Outlines Strategy
From ACM News

New Cyber Chief Outlines Strategy

Security experts said this week that they were cheered by calls from General Keith Alexander, head of the new U.S. Cyber Command, for global rules of engagement...

Open-Source Could Mean an Open Door For Hackers
From ACM News

Open-Source Could Mean an Open Door For Hackers

The ability to access the code of open-source applications may give attackers an edge in developing exploits for the software, according to a paper analyzing two...

Mobile Data: A Gold Mine For Telcos
From ACM News

Mobile Data: A Gold Mine For Telcos

Cell phone companies are finding that they're sitting on a gold mine--in the form of the call records of their subscribers.

Commercial Quantum Cryptography System Hacked
From ACM News

Commercial Quantum Cryptography System Hacked

Physicists have mounted the first successful attack of its kind on a commercial quantum cryptography system.

Physicists ­se Location to Guarantee Security of Quantum Messages
From ACM TechNews

Physicists ­se Location to Guarantee Security of Quantum Messages

UCLA researchers have developed a type of quantum cryptography, which guarantees that only a person at a certain location can read an encrypted message. 

How Isps Could Combat Botnets
From ACM News

How Isps Could Combat Botnets

Convincing Internet service providers to pinpoint infected computers on their networks could eliminate the lion's share of zombie computers responsible for churning...

From ACM TechNews

Peeking Into Users' Web History

In a test of Google's privacy protections, European researchers were able to hijack Google's personalized search suggestions to reconstruct users' Web search histories...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account