acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorBloomberg Businessweek
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Cookies You Can't Crumble
From ACM News

The Cookies You Can't Crumble

If you've used the Internet for longer than the iPhone has been around, you're probably familiar with cookies, those little packets of personal data that help load...

As China Stalks Satellites, ­.S. and Japan Prepare to Defend Them
From ACM News

As China Stalks Satellites, ­.S. and Japan Prepare to Defend Them

In May 2013 the Chinese government conducted what it called a science space mission from the Xichang Satellite Launch Center in southwest China.

How Russian Hackers Stole the Nasdaq
From ACM News

How Russian Hackers Stole the Nasdaq

In October 2010, a Federal Bureau of Investigation system monitoring U.S. Internet traffic picked up an alert.

Hospitals Are Mining Patients' Credit Card Data to Predict Who Will Get Sick
From ACM News

Hospitals Are Mining Patients' Credit Card Data to Predict Who Will Get Sick

Imagine getting a call from your doctor if you let your gym membership lapse, make a habit of buying candy bars at the checkout counter, or begin shopping at plus...

The Bbc Doesn't Want to Be Forgotten By Google
From ACM News

The Bbc Doesn't Want to Be Forgotten By Google

Since agreeing to comply with the European Court of Justice’s decision that people have the right to be forgotten, Google has received about 50,000 requests for...

Hackers Devise Wireless Methods For Stealing Atm Users' Pins
From ACM News

Hackers Devise Wireless Methods For Stealing Atm Users' Pins

Pilfering the personal identification numbers of financial accounts, a potential jackpot for hackers, is tougher to pull off thanks to data encryption and other...

The U.s. Government Wants 6,000 New 'cyber Warriors' By 2016
From ACM Careers

The U.s. Government Wants 6,000 New 'cyber Warriors' By 2016

The Pentagon plans to triple its cybersecurity staff by 2016, U.S. Secretary of Defense Chuck Hagel announced recently.

Justice Scalia Looks Forward to Hearing Nsa Spying Case
From ACM News

Justice Scalia Looks Forward to Hearing Nsa Spying Case

Justice Antonin Scalia signaled during a law school talk on March 21 that the Supreme Court is very much aware that legal challenges to the National Security Agency's...

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers
From ACM News

Cyberwar in ­kraine Falls Far Short of Russia's Full Powers

The tense on-the-ground standoff in Ukraine has already tipped into open hostilities online, with hackers targeting members of parliament and state agencies.

Since It Can't Sue ­s All, Getty Images Embraces Embedded Photos
From ACM News

Since It Can't Sue ­s All, Getty Images Embraces Embedded Photos

For the past decade or so, the best defense Getty Images could find against the right-click button on your mouse—home of the "copy" and "save" functions—has been...

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built
From ACM News

The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built

Last year, Edward Snowden turned over to the Guardian, a British newspaper, some 58,000 classified U.S. government documents.

The Bitcoin-Mining Arms Race Heats Up
From ACM News

The Bitcoin-Mining Arms Race Heats Up

Joel Flickinger's two-bedroom home in the hills above Oakland, Calif., hums with custom-built computing gear.

Does Bitcoin Have a Future in Politics?
From ACM News

Does Bitcoin Have a Future in Politics?

Representative Steve Stockman (R-Tex.) is no stranger to provocative proposals.

The Hidden Technology That Makes Twitter Huge
From ACM News

The Hidden Technology That Makes Twitter Huge

Consider the tweet.

Nsa Surveillance Makes For Strange Bedfellows
From ACM Opinion

Nsa Surveillance Makes For Strange Bedfellows

The controversy over U.S. government surveillance has produced a king-size collection of strange bedfellows. Beneath the covers one finds both amusing ironies and...

Vending Machines Get Smart to Accommodate the Cashless
From ACM Careers

Vending Machines Get Smart to Accommodate the Cashless

More than 40 percent of U.S. adults say they can go a week without paying for something with cash, according to a survey conducted by Rasmussen Reports last year...

How Syrian Hackers Found the New York Times's Australian Weak Spot
From ACM News

How Syrian Hackers Found the New York Times's Australian Weak Spot

A hacking attack launched by the Syrian Electronic Army may have targeted the New York Timesand other U.S. media companies, but the weak link was Melbourne IT (...

Medical Hacking Poses a Terrifying Threat, in Theory
From ACM News

Medical Hacking Poses a Terrifying Threat, in Theory

In the world of hypothetical cybercrime, not much is scarier than the hacked medical device.

New ATM Designs Imitate Online and Mobile Banking
From ACM News

New ATM Designs Imitate Online and Mobile Banking

Before heading to lunch, Kirsten Keary-Taylor, 29, uses an iPhone app to request $20 from a nearby ATM. Passing the cash machine on her way out, she scans it with...

Privacy Paradox: Americans Happy to Share Personal Data With Big Business
From ACM News

Privacy Paradox: Americans Happy to Share Personal Data With Big Business

It's official: Americans may freak out when government collects their data to track terrorists, but they would happily have banks use it to catch some jerk trying...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account