acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How ­seful Is a Captured Drone?
From ACM News

How ­seful Is a Captured Drone?

An American surveillance drone has been captured and filmed in Iran, where experts are apparently examining it.

Socialbots Used By Researchers to 'steal' Facebook Data
From ACM TechNews

Socialbots Used By Researchers to 'steal' Facebook Data

University of British Columbia researchers were able to collect 46,500 email addresses and 14,500 home addresses from Facebook by using socialbots. 

From ACM News

Robot Wars 'Still a Long Way Off'

"I'll be back" said Arnold Schwarzenegger as cyborg-assassin the Terminator, back from the year 2029 to carry out a murder in 1984. But it seems that, when it...

New Emotion Detector Sees When We're Lying
From ACM News

New Emotion Detector Sees When We're Lying

A sophisticated new camera system can detect lies just by watching our faces as we talk, experts say. The computerized system uses a simple video camera, a high...

'smart' Cctv Could Track Rioters
From ACM News

'smart' Cctv Could Track Rioters

Researchers at Kingston University have created a system that uses artificial intelligence to recognise specific types of behaviour, such as someone holding a...

U.k. Seeks Cyber Security Champions
From ACM News

U.k. Seeks Cyber Security Champions

Britons who can defend the nation's networks armed only with a keyboard are being sought in a national competition.

Code-Cracking Machine Returned to Life
From ACM News

Code-Cracking Machine Returned to Life

The National Museum of Computing has finished restoring a Tunny machine—a key part of Allied code-cracking during World War II.

New Net Rules Set to Make Cookies Crumble
From ACM News

New Net Rules Set to Make Cookies Crumble

The way Websites track visitors and tailor ads to their behavior is about to undergo a big shake-up. From 25 May, European laws dictate that "explicit consent"...

Stuxnet Virus Targets and Spread Revealed
From ACM News

Stuxnet Virus Targets and Spread Revealed

A powerful internet worm repeatedly targeted five industrial facilities in Iran over 10 months, ongoing analysis by security researchers shows.

Proposal for Cyber War Rules of Engagement
From ACM News

Proposal for Cyber War Rules of Engagement

The world needs cyber war "Rules of Engagement" to cope with potentially devastating cyber weapons, Russian and US experts will tell world leaders at a security...

Privacy Project ­ses Cryptography to Reduce Shared Info
From ACM TechNews

Privacy Project ­ses Cryptography to Reduce Shared Info

An electronic wallet that encrypts the owner's personal information is being developed by IBM researchers. The device will only allow the sharing of information...

Anonymous Hacktivists Say Wikileaks War to Continue
From ACM News

Anonymous Hacktivists Say Wikileaks War to Continue

A member of the Anonymous group of hackers, which has been targeting firms it sees as being anti-Wikileaks has said the campaign is not over.

From ACM TechNews

'fingerprint' Software to STEM Cyber Crime

GuardInQ, new digital fingerprinting software developed by researchers at Edinburgh Napier University, offers closed-caption TV-style monitoring of online systems...

Code Clues Point to Stuxnet Maker
From ACM News

Code Clues Point to Stuxnet Maker

Detailed analysis of the code in the Stuxnet worm has narrowed the list of suspects who could have created it.

European Cyber Defenses 'Must Improve,' Tests Show
From ACM TechNews

European Cyber Defenses 'Must Improve,' Tests Show

European Union (EU) member states need to do more to prepare for cyberattacks, concludes a report of Cyber Europe 2010, a simulation of how EU countries would react...

From ACM News

What Is Wikileaks?

Months after releasing some 90,000 secret records of U.S. military incident and intelligence reports about the war in Afghanistan, Wikileaks has posted online...

Call to Define Rules of Cyber War
From ACM News

Call to Define Rules of Cyber War

Nations need to define the rules of engagement for acts of cyber terror.

Sick PCs Should Be Banned From the Net Says Microsoft
From ACM TechNews

Sick PCs Should Be Banned From the Net Says Microsoft

Microsoft researcher Scott Charney recently presented an Internet security proposal that requires users to present a "health certificate" to prove that their PCs...

From ACM News

Wikileaks Encryption ­se Offers 'legal Challenge'

A novel use of encryption by whistle-blowing website Wikileaks could "challenge the legal system for years to come," according to an influential observer of the...

From ACM News

Private Browsing Modes Leak Data

The private browsing modes on modern browsers leak information about where people have visited, suggests a study.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account