acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Forget Apple vs. the Fbi: Whatsapp Just Switched on Encryption For a Billion People
From ACM News

Forget Apple vs. the Fbi: Whatsapp Just Switched on Encryption For a Billion People

For most of the past six weeks, the biggest story out of Silicon Valley was Apple's battle with the FBI over a federal order to unlock the iPhone of a mass shooter...

Why Do the Feds ­sually Try to ­nlock Phones? It's Drugs, Not Terrorism
From ACM News

Why Do the Feds ­sually Try to ­nlock Phones? It's Drugs, Not Terrorism

Until the FBI backed down from its battle with Apple over accessing the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, it seemed the agency had chosen...

The Apple-Fbi Battle Is Over, But the New Crypto Wars Have Just Begun
From ACM News

The Apple-Fbi Battle Is Over, But the New Crypto Wars Have Just Begun

Apple's standoff with the FBI unfolded over the course of several weeks, but ended in a matter of days.

­tah's Online Caucus Gives Security Experts Heart Attacks
From ACM News

­tah's Online Caucus Gives Security Experts Heart Attacks

Security researchers pretty much uniformly agree that letting people vote online is a very bad idea, one that is fraught with risks and vulnerabilities that could...

Long Before the Apple-Fbi Battle, Lavabit Sounded a Warning
From ACM News

Long Before the Apple-Fbi Battle, Lavabit Sounded a Warning

Three years ago, Ladar Levison, the founder of the now-defunct secure email service known as Lavabit, was in the same position Apple finds itself today: facing...

The Fbi Warns That Car Hacking Is a Real Risk
From ACM News

The Fbi Warns That Car Hacking Is a Real Risk

It's been eight months since a pair of security researchers proved beyond any doubt that car hacking is more than an action movie plot device when they remotely ...

Biometrics Are Coming, Along With Serious Security Concerns
From ACM News

Biometrics Are Coming, Along With Serious Security Concerns

You're buying a pair of jeans. At the register, instead of reaching for your wallet or phone, you pull back your hair.

Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid
From ACM News

Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid

It was 3:30 p.m. last December 23, and residents of the Ivano-Frankivsk region of Western Ukraine were preparing to end their workday and head home through the...

How the Feds Could Get Into Iphones Without Apple's Help
From ACM News

How the Feds Could Get Into Iphones Without Apple's Help

It's a showdown that has the country mesmerized.

Flaws in Wireless Mice and Keyboards Let Hackers Type on Your Pc
From ACM TechNews

Flaws in Wireless Mice and Keyboards Let Hackers Type on Your Pc

Bastille researchers warn of a new hacking technique in which malefactors armed with antennas can hijack wireless keyboards and mice from seven companies.

Apple's Fbi Battle Is Complicated. Here's What's Really Going On
From ACM News

Apple's Fbi Battle Is Complicated. Here's What's Really Going On

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...

If You Go Near the Super Bowl, You Will Be Surveilled Hard
From ACM News

If You Go Near the Super Bowl, You Will Be Surveilled Hard

Super Bowl 50 will be big in every way.

How to Make Your Own Nsa Bulk Surveillance System
From ACM TechNews

How to Make Your Own Nsa Bulk Surveillance System

A network surveillance and security issues expert built a miniature bulk surveillance system like the one used by the U.S. National Security Agency.

Nsa Hacker Chief Explains How to Keep Him Out of Your System
From ACM News

Nsa Hacker Chief Explains How to Keep Him Out of Your System

It was the talk most anticipated at this year's inaugural Usenix Enigma security conference in San Francisco and one that even the other speakers were eager to...

An Easy Way For Hackers to Remotely Burn Industrial Motors
From ACM News

An Easy Way For Hackers to Remotely Burn Industrial Motors

Hacks that cause physical destruction are so rare they can be counted on one hand.

The Father of Online Anonymity Has a Plan to End the Crypto War
From ACM TechNews

The Father of Online Anonymity Has a Plan to End the Crypto War

David Chaum, who has invented many cryptographic protocols, has developed an encryption scheme for secret, anonymous communications. 

How the Internet of Things Got Hacked
From ACM News

How the Internet of Things Got Hacked

There was once a time when people distinguished between cyberspace, the digital world of computers and hackers, and the flesh-and-blood reality known as meatspace...

Nobody Knew How Big a Deal the Cloud Would Be—they Do Now
From ACM News

Nobody Knew How Big a Deal the Cloud Would Be—they Do Now

Ten years ago, Amazon unleashed a technology that we now call, for better or for worse, cloud computing.

The Secret History of World War Ii-Era Drones
From ACM News

The Secret History of World War Ii-Era Drones

Drones are the hallmark of tech-y modern warfare, but weapons piloted from afar have been around for more than a century.  

Hacker Lexicon: Malvertising, the Hack That Infects Computers Without a Click
From ACM News

Hacker Lexicon: Malvertising, the Hack That Infects Computers Without a Click

Malvertising is when hackers buy ad space on a legitimate website, and, as the name suggests, upload malicious advertisements designed to hack site visitor’s computers...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account