acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


What Will Hackers Do with the New Kinect?
From ACM Careers

What Will Hackers Do with the New Kinect?

Microsoft announced a new version of the Xbox One earlier this week, and with it an improved and essentially reinvented version of Kinect, the company's body- and...

Government Lab Reveals It Has Operated Quantum Internet for Over Two Years
From ACM TechNews

Government Lab Reveals It Has Operated Quantum Internet for Over Two Years

Los Alamos National Labs has been running a quantum Internet that can transmit perfectly secure messages for more than two years. 

Samsung Demos a Tablet Controlled By Your Brain
From ACM News

Samsung Demos a Tablet Controlled By Your Brain

One day, we may be able to check email or call a friend without ever touching a screen or even speaking to a disembodied helper.

How Wireless Carriers Are Monetizing Your Movements
From ACM News

How Wireless Carriers Are Monetizing Your Movements

Wireless operators have access to an unprecedented volume of information about users' real-world activities, but for years these massive data troves were put to...

Google Wants to Replace Your Passwords With a Ring
From ACM TechNews

Google Wants to Replace Your Passwords With a Ring

Google has developed rings designed to be worn on the finger that provide security for logging into a computer or an online account.

Clues Suggest Malware Is Moving from Pcs to Mobile Devices
From ACM News

Clues Suggest Malware Is Moving from Pcs to Mobile Devices

The fact that smartphones and tablets don't need antivirus software or regular software updates is a major reason for their popularity.

Exposé of Chinese Data Thieves Reveals Sloppy Tactics
From ACM News

Exposé of Chinese Data Thieves Reveals Sloppy Tactics

A beige office block in Shanghai's suburbs belonging to the Chinese army became world famous on Tuesday after Mandiant, a Washington-based computer security company...

Welcome to the Malware-Industrial Complex
From ACM News

Welcome to the Malware-Industrial Complex

Every summer, computer security experts get together in Las Vegas for Black Hat and DEFCON, conferences that have earned notoriety for presentations demonstrating...

The Browser Wars Go Mobile
From ACM News

The Browser Wars Go Mobile

When surfing the Web on a smartphone, most of us stick with the browser that came with our handset.

The Rise of Voice Biometrics For Mobile Phones
From ACM TechNews

The Rise of Voice Biometrics For Mobile Phones

University of Colorado at Colorado Springs researchers have developed Vaulted Voice Verification, an approach to voice identification that can be used for voice...

How Google Plans to Find the ­ngoogleable
From ACM News

How Google Plans to Find the ­ngoogleable


How to Steal Data from Your Neighbor in the Cloud
From ACM News

How to Steal Data from Your Neighbor in the Cloud

Cloud computing teaches people not to worry about physical equipment for hosting data and running software.

Why You Can't Vote Online
From ACM TechNews

Why You Can't Vote Online

The lack of verifiable security in online voting systems due to unresolved fundamental problems is the main reason such systems are impractical, according to computer...

Why You Can't Vote Online Tuesday
From ACM News

Why You Can't Vote Online Tuesday

A decade and a half into the Web revolution, we do much of our banking and shopping online. So why can't we vote over the Internet? The answer is that voting presents...

The States with the Riskiest Voting Technology
From ACM News

The States with the Riskiest Voting Technology

Next Tuesday's presidential election will likely be extremely close, magnifying the potential impact of vote-counting errors.

Preparing For Cyber War, Without a Map
From ACM TechNews

Preparing For Cyber War, Without a Map

The U.S. government's retaliatory capability in response to cyberattacks on critical infrastructure is limited by a dearth of technology.  

Computer Viruses Are 'rampant' on Medical Devices in Hospitals
From ACM News

Computer Viruses Are 'rampant' on Medical Devices in Hospitals

Computerized hospital equipment is increasingly vulnerable to malware infections, according to participants in a recent government panel. These infections can clog...

Ever Wondered What a Live Botnet Looks Like?
From ACM News

Ever Wondered What a Live Botnet Looks Like?

The idea of a network of malware-infected zombie computers rigged to do the bidding of criminals conjures up a frightening image on its own. A new visualization...

To Keep Passwords Safe From Hackers, Just Break Them Into Bits
From ACM TechNews

To Keep Passwords Safe From Hackers, Just Break Them Into Bits

RSA researchers have developed a system that splits passwords in two and stores each half in different locations.  

Stuxnet Tricks Copied By Computer Criminals
From ACM TechNews

Stuxnet Tricks Copied By Computer Criminals

Security researchers warn that the techniques used in sophisticated, state-supported malware are being used by less-skilled programmers to target Web users.  
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account