acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Raising a Botnet in Captivity
From ACM News

Raising a Botnet in Captivity

Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet.

Tracking Trick Shows the Web Where You Are
From ACM News

Tracking Trick Shows the Web Where You Are

A new technique from Microsoft Research Silicon Valley could be used to target advertising to users' surroundings without their knowledge.

Parc Readies Printed Electronics For Market
From ACM News

Parc Readies Printed Electronics For Market

Early 2011 will see printed memory devices in toys and printed sensors in packages used to ship drugs.

From ACM News

New Class of Malware Attacks Specific Chips

Computer scientists reveal malware that attacks specific processors rather than the operating system that runs on them.

Watch Where You're Going
From ACM News

Watch Where You're Going

Businesses are quietly buying mobile-phone data to discover the paths that consumers take.

Anticensorship Tool Proves Too Good to Be True
From ACM News

Anticensorship Tool Proves Too Good to Be True

Experts warn that the software could identify those it claims to protect.

Preventing Smart-Phone Armageddon
From ACM TechNews

Preventing Smart-Phone Armageddon

Attacks against smartphones are likely to proliferate because of their growing ubiquity and the sensitive information they carry. However, researchers believe...

Taking Over a Car
From ACM News

Taking Over a Car

Researchers "break in" with software and a laptop.

What Does 'p vs. Np' Mean For the Rest of Us?
From ACM News

What Does 'p vs. Np' Mean For the Rest of Us?

A proposed "proof" is probably a bust—but even failed attempts can advance computer science.

Mobile Flaw Could Cloak Clicks
From ACM TechNews

Mobile Flaw Could Cloak Clicks

Stanford University researchers have found that mobile websites are extremely vulnerable to attacks from malicious sites using a technique known as tapjacking,...

From ACM News

A Sidewalk Disappearing Act

Automatically removing people from street-level imagery could help prevent privacy complaints.

Wireless Car Sensors Vulnerable to Hackers
From ACM News

Wireless Car Sensors Vulnerable to Hackers

Hackers could "hijack" the wireless pressure sensors built into many cars' tires, researchers have found. Criminals might then track a vehicle or force its electronic...

Wikileaks Backlash Could Mean Less Data For Soldiers
From ACM News

Wikileaks Backlash Could Mean Less Data For Soldiers

Information shared with troops may be restricted.

Hacking the Smart Grid
From ACM News

Hacking the Smart Grid

The hurried deployment of smart-grid technology could leave critical infrastructure and private homes vulnerable to hackers. Security experts at the Black Hat...

From ACM News

The Hunt For the Wikileaks Whistle-Blower

Attorney General Eric Holder's new probe into Wikileaks's posting of 91,000 war documents will likely find that tracing the path of the documents back through the...

From ACM News

So Many Bugs, So Little Time

Tools that find serious bugs automatically could lead to safer, more stable software.

Passwords that Are Simple
From ACM News

Passwords that Are Simple

Researchers at Microsoft have come up with a way to create easy-to-remember passwords without making a system more vulnerable to hackers.

Nanoscale Random Number Circuit to Secure Future Chips
From ACM TechNews

Nanoscale Random Number Circuit to Secure Future Chips

Intel engineers have created computer processors with circuits capable of random behavior, a development that could lead to secure cryptography keys.

From ACM News

Computing with Secrets, but Keeping them Safe

A novel technique could see future Web services work with sensitive data without ever being able to read it. Several implementations of a mathematical proof unveiled...

New Cyber Chief Outlines Strategy
From ACM News

New Cyber Chief Outlines Strategy

Security experts said this week that they were cheered by calls from General Keith Alexander, head of the new U.S. Cyber Command, for global rules of engagement...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account