acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe Wall Street Journal
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Google Says It Reviewed 1.2 Million Web Pages For 'right to Be Forgotten'
From ACM News

Google Says It Reviewed 1.2 Million Web Pages For 'right to Be Forgotten'

Alphabet Inc.'s Google on Wednesday said it has evaluated more than 1.2 million Web pages for compliance with Europe's "Right to Be Forgotten" ruling, and removed...

Paris Attacks Fan Encryption Debate
From ACM News

Paris Attacks Fan Encryption Debate

White House and congressional staffers have asked Silicon Valley executives for new talks in Washington, D.C., to resolve a standoff over encrypted communication...

U.s. Tech Firms Look To Data Centers on European Soil
From ACM News

U.s. Tech Firms Look To Data Centers on European Soil

Silicon Valley companies say they’ve been preparing for yesterday's European Court of Justice decision invalidating the U.S.-Europe Safe Harbor agreement on data...

Apple and Google Know What You Want Before You Do
From ACM News

Apple and Google Know What You Want Before You Do

Apple Inc. and Google Inc. are racing to anticipate the needs of their users.

China Pushes to Rewrite Rules of Global Internet
From ACM TechNews

China Pushes to Rewrite Rules of Global Internet

China's government aims to redraft the rules of the global Internet so it can regulate the Internet on its own terms. 

Moxie Marlinspike: The Coder Who Encrypted Your Texts
From ACM News

Moxie Marlinspike: The Coder Who Encrypted Your Texts

Dreadlocked programmer has spooked the FBI by creating a tool that police cannot crack.

Automakers Tackle the Massive Security Challenges of Connected Vehicles
From ACM News

Automakers Tackle the Massive Security Challenges of Connected Vehicles

The National Highway Traffic Safety Administration is accelerating its efforts to mandate vehicle-to-vehicle communications, a step that could help lower the number...

When Does a Hack Become an Act of War?
From ACM News

When Does a Hack Become an Act of War?

A tremendous number of personnel records—including some quite personal records—have likely been stolen by computer hackers.

Vietnam's Mobile Revolution Catapults Millions Into the Digital Age
From ACM Careers

Vietnam's Mobile Revolution Catapults Millions Into the Digital Age

To get an idea of how the mobile Web is catapulting millions of people into the digital age by skipping landline connections, have a look at Vietnam.

U.s. Surveillance Backlash Could Cost Tech Companies More Than $35 Billion By 2016
From ACM Careers

U.s. Surveillance Backlash Could Cost Tech Companies More Than $35 Billion By 2016

The U.S. government's widespread data surveillance practices are likely to cost U.S. cloud computing and other technology companies more money than originally expected...

New Computer Bug Exposes Broad Security Flaws
From ACM TechNews

New Computer Bug Exposes Broad Security Flaws

An international team has discovered an Internet bug that enables an attacker to trick a Web browser into believing it is using a regular key rather than the export...

Google's Vint Cerf Warns Against Fragmentation of Internet
From ACM Opinion

Google's Vint Cerf Warns Against Fragmentation of Internet

Internet pioneer Vinton G. Cerf warned Thursday that political and technological forces threaten universal access and integrity, which he described as the foundation...

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia
From ACM News

In Nato Cyber Wargame, Berlya Fends Off Arch-Enemy Crimsonia

Somewhere near Iceland, a new NATO member, Berlya is under cyber-attack, most likely launched from its arch-rival Crimsonia, although the Berlyans can’t be completely...

Should Law Enforcement Have the Ability to Access Encrypted Communications?
From ACM Opinion

Should Law Enforcement Have the Ability to Access Encrypted Communications?

People's distress over the privacy of their communications has never been more acute. Whether the fear is over U.S. surveillance or breaches by hackers of unknown...

Security Professionals Stymied By Outdated Visualization Tools
From ACM Careers

Security Professionals Stymied By Outdated Visualization Tools

Earlier this year, the film Blackhat got high marks for realistic scenes in which hackers and information security specialists work at their computers to hunt down...

Cybercriminals Are Misappropriating Businesses' Web Addresses
From ACM News

Cybercriminals Are Misappropriating Businesses' Web Addresses

Cybercriminals targeting businesses are stealing more than customer passwords and credit-card numbers these days.

Chip Makers Push New Senses For Smartphones–mobile World
From ACM News

Chip Makers Push New Senses For Smartphones–mobile World

Smartphones are about to get smarter, chip makers say, exploiting technologies that recognize people, objects and sounds to boost security and take helpful actions...

White House Names Nation's First Chief Data Scientist
From ACM Careers

White House Names Nation's First Chief Data Scientist

Taking a page from Silicon Valley's playbook, the White House said on Wednesday it had appointed the nation's first chief data scientist.

The Technology that ­nmasks Your Hidden Emotion
From ACM News

The Technology that ­nmasks Your Hidden Emotion

Paul Ekman, perhaps the world's most famous face reader, fears he has created a monster.

Time to Change Global Clock Management? It's ­nder Debate
From ACM News

Time to Change Global Clock Management? It's ­nder Debate

Does anybody really know what time it is?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account