acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorCNET
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Forcing Browsers to ­se Encryption

The Internet Engineering Task Force has developed a security mechanism to mitigate the threat from browser add-ons that allow attackers to easily capture the cookies...

Study Finds Support For Presidential Net 'kill Switch'
From ACM TechNews

Study Finds Support For Presidential Net 'kill Switch'

Sixty-one percent of U.S. citizens believe the president should be authorized to control or even shut down portions of the Internet in the event key U.S. systems...

From ACM News

Amid Criticism, Wikileaks Shifts Focus

When WikiLeaks launched with little fanfare in early 2007, its founders touted it as a unique collaboration that would rely on the same anyone-can-edit software...

Microsoft Fixes Record 49 Holes, Including Stuxnet Flaw
From ACM News

Microsoft Fixes Record 49 Holes, Including Stuxnet Flaw

In a record Patch Tuesday, Microsoft released updates today for Windows, Internet Explorer, and the .NET framework that feature fixes for 49 holes, including...

From ACM News

Eu Calls Stuxnet 'paradigm Shift' As U.s. Responds More Mildly

While official U.S. response has been comparatively mild, the European Union's cybersecurity agency says Stuxnet represents a "paradigm shift" in critical infrastructure...

Stuxnet: Fact vs. Theory
From ACM News

Stuxnet: Fact vs. Theory

The Stuxnet worm has taken the computer security world by storm, inspiring talk of  a government-sponsored cyberwar, and of a software program laden with obscure...

Emotionml: Will Computers Tap Into Your Feelings?
From ACM News

Emotionml: Will Computers Tap Into Your Feelings?

For all those who believe the computing industry is populated by people who are out of touch with the world of emotion, it's time to think again.

Stuxnet Could Hijack Power Plants, Refineries
From ACM News

Stuxnet Could Hijack Power Plants, Refineries

A worm that targets critical infrastructure companies doesn't just steal data, it leaves a back door that could be used to remotely and secretly control plant...

For Kevin Mitnick, Staying Legal Is Job One
From ACM News

For Kevin Mitnick, Staying Legal Is Job One

Kevin Mitnick was eager to participate in a social-engineering contest at the Defcon hacker conference in Las Vegas last weekend and was told he would target Microsoft...

­.s. Military Cyberwar: What's Off-Limits?
From ACM News

­.s. Military Cyberwar: What's Off-Limits?

The United States should decide on rules for attacking other nations' networks in advance of an actual cyberwar, which could include an international agreement...

From ACM News

Working to Make Combat Soldiers' Lives Easier

In combat, things can be so chaotic and loud that soldiers sometimes aren't even aware they're being shot at.

From ACM News

Police Push to Continue Warrantless Cell Tracking

A law requiring police to obtain a search warrant before tracking Americans' cell phones may imperil criminal investigations and endanger children's lives, a law...

From ACM News

Google Rolls Out Encrypted Web Search Option

Google began offering an encrypted option for Web searchers on Friday and said it planned to roll it out for all of its services eventually.

Nsa's Boot Camp For Cyberdefense
From ACM News

Nsa's Boot Camp For Cyberdefense

If you're the kind of person who worries about the security of computer networks, you should know that the National Security Agency is worrying about it too. Since...

From ACM News

Google Backs Yahoo in Privacy Fight with Doj

Google and an alliance of privacy groups have come to Yahoo's aid by helping the Web portal fend off a broad request from the U.S. Department of Justice for e-mail...

Playing It Safe With Two Networks
From ACM News

Playing It Safe With Two Networks

To protect itself from hackers, Cryptography Research runs two unconnected networks—one for sensitive data and core engineering work that is not connected to the...

­.s. Cyber Command Prepped to Launch
From ACM News

­.s. Cyber Command Prepped to Launch

Washingon's new U.S. Cyber Command is prepped and ready but is still waiting for Senate approval of its new commander before it can open for business.

Experts Warn of Catastrophe From Cyberattacks
From ACM TechNews

Experts Warn of Catastrophe From Cyberattacks

A panel of experts told U.S. senators at a recent hearing of the Senate Committee on Commerce, Science, and Transportation that the United States would be defeated...

From ACM News

Feds Push For Tracking Cell Phones

Two years ago, when the FBI was stymied by a band of armed robbers known as the "Scarecrow Bandits" that had robbed more than 20 Texas banks, it came up with aconvicted...

Hacker 'mudge' Gets DARPA Job
From ACM News

Hacker 'mudge' Gets DARPA Job

Peiter Zatko--a respected hacker known as "Mudge"--has been tapped to be a program manager at DARPA, where he will be in charge of funding research designed toDARPA...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account