acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
datePast Year
subjectSecurity
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


China's Search Engines Have More Than 66,000 Content Rules
From ACM TechNews

China's Search Engines Have More Than 66,000 Content Rules

Analysts found China's search engines have more than 66,000 rules governing content, suggesting the growing pervasiveness and subtlety of the country's censorship...

The Next Fear on A.I.: Hollywood's Killer Robots Become the Military's Tools
From ACM News

The Next Fear on A.I.: Hollywood's Killer Robots Become the Military's Tools

U.S. national security officials are warning about the potential for the new technology to upend war, cyber conflict and — in the most extreme case — the use of...

The End of Faking It in Silicon Valley
From ACM News

The End of Faking It in Silicon Valley

Recent charges, convictions, and sentences all indicate that the start-up world's habit of playing fast and loose with the truth actually has consequences.

A Front Company and a Fake Identity: How the U.S. Came to Use Spyware It Was Trying to Kill.
From ACM News

A Front Company and a Fake Identity: How the U.S. Came to Use Spyware It Was Trying to Kill.

The Biden administration has been trying to choke off use of hacking tools made by the Israeli firm NSO. It turns out that not every part of the government has...

Utah Law Could Curb Use of TikTok, Instagram by Children, Teens
From ACM TechNews

Utah Law Could Curb Use of TikTok, Instagram by Children, Teens

Utah's Governor Spencer J. Cox signed a social media bill that could restrict access to applications like TikTok and Instagram by children and adolescents.

Making Deepfakes Gets Cheaper and Easier Thanks to A.I.
From ACM News

Making Deepfakes Gets Cheaper and Easier Thanks to A.I.

Meme-makers and misinformation peddlers are embracing artificial intelligence tools to create convincing fake videos on the cheap.

New Biden Cybersecurity Strategy Assigns Responsibility to Tech Firms
From ACM News

New Biden Cybersecurity Strategy Assigns Responsibility to Tech Firms

The policy document urges more mandates on the firms that control most of the nation's digital infrastructure, and an expanded government role to disrupt hackers...

The People Onscreen Are Fake. The Disinformation Is Real
From ACM News

The People Onscreen Are Fake. The Disinformation Is Real

Computer-generated avatars created by artificial intelligence software are being used by pro-China bot accounts as part of state-aligned disinformation campaigns...

Five Takeaways From the House G.O.P. Hearing With Former Twitter Executives
From ACM News

Five Takeaways From the House G.O.P. Hearing With Former Twitter Executives

The Oversight Committee called the session to scrutinize whether the social media platform has censored the right, but it yielded new revelations about the company's...

Disinformation Researchers Raise Alarms About A.I. Chatbots
From ACM News

Disinformation Researchers Raise Alarms About A.I. Chatbots

Researchers used ChatGPT to produce clean, convincing text that repeated conspiracy theories and misleading narratives.

How the Netherlands Is Taming Big Tech
From ACM TechNews

How the Netherlands Is Taming Big Tech

Netherlands government and educational institutions have pushed big tech companies to make significant privacy changes by negotiating their compliance with European...

Crypto Meltdown, What Crypto Meltdown?
From ACM News

Crypto Meltdown, What Crypto Meltdown?

Despite trillions of dollars of losses, a batch of bankruptcies and one very high profile arrest, blockchain's devotees remain devoted.

To the Highest Bidder: A Military Database of Fingerprints, Iris Scans
From ACM TechNews

To the Highest Bidder: A Military Database of Fingerprints, Iris Scans

Security researcher Matthias Marx successfully bid on eBay for a Secure Electronic Enrollment Kit, which contained the names, nationalities, photographs, fingerprints...

How Hackers Used One Software Flaw to Take Down a County Computer System
From ACM News

How Hackers Used One Software Flaw to Take Down a County Computer System

An information technology director was put on leave for negligence after Suffolk County officials released the results of their investigation.

How the Global Spyware Industry Spiraled Out of Control
From ACM News

How the Global Spyware Industry Spiraled Out of Control

The market for commercial spyware — which allows governments to invade mobile phones and vacuum up data — is booming. Even the U.S. government is using it.

Oversight Board Criticizes Meta for Preferential Treatment
From ACM News

Oversight Board Criticizes Meta for Preferential Treatment

Influential and powerful users on Facebook and Instagram receive "unequal treatment," an internal report said.

How China's Police Used Phones, Faces to Track Protesters
From ACM TechNews

How China's Police Used Phones, Faces to Track Protesters

China's police used an advanced surveillance system to track protesters who rallied against the government's pandemic policies this past week.

Facebook Failed to Stop Ads Threatening Election Workers
From ACM TechNews

Facebook Failed to Stop Ads Threatening Election Workers

Researchers tested Facebook's automated moderation system by submitting ads around Election Day that contained direct threats against election workers.

How the Collapse of Sam Bankman-Fried's Crypto Empire Has Disrupted A.I.
From ACM News

How the Collapse of Sam Bankman-Fried's Crypto Empire Has Disrupted A.I.

Bankman-Fried and his colleagues spent more than $530 million to battle what they saw as the dangers of artificial intelligence. Now those efforts are reeling. ...

The Long Road to Driverless Trucks
From ACM News

The Long Road to Driverless Trucks

Self-driving eighteen-wheelers are on U.S. highways, but there are still human "safety drivers" behind the wheel. What will it take to get them out?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account