acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorCNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Researchers to Detail Hole in Web Encryption
From ACM TechNews

Researchers to Detail Hole in Web Encryption

Security researchers Juliano Rizzo and Thai Duong will demonstrate an attack that compromises Transport Layer Security 1.0 at the Ekoparty conference in Argentina...

From ACM News

Privacy at Risk: Who's Watching You?

The notion of Big Brother has been around for decades, but technology has long lagged behind the Orwellian imagination. Not any more; in the era of smartphones...

From ACM News

Black Hat: Legal Pitfalls of Investigating Mobile

Hackers today are testing mobile devices ever more strenuously, but the work often stands on shaky legal ground, according to Jennifer Granick, an attorney for...

Expert Hacks Car System, Says Problems Reach to Scada Systems
From ACM News

Expert Hacks Car System, Says Problems Reach to Scada Systems

Researcher Don A. Bailey will be showing at the Black Hat security conference how easy it is to open and even start a car remotely by hacking the cellular network...

Kevin Mitnick Shows How Easy It Is to Hack a Phone
From ACM News

Kevin Mitnick Shows How Easy It Is to Hack a Phone

British tabloid News of the World said it is closing down over a phone hacking scandal in which workers for the Rupert Murdoch-owned newspaper allegedly snooped...

From ACM News

With Anonymous and Lulzsec, Is Anyone Believable?

For several months, hackers have been having a heyday taking down Web sites and leaking data from compromised servers with victims ranging from the CIA and U.S...

Microsoft Declares Webgl 'harmful' to Security
From ACM TechNews

Microsoft Declares Webgl 'harmful' to Security

Some researchers say that WebGL, a universal three-dimensional Web graphics standard that has been widely anticipated by Web programmers, could lead to significant...

From ACM News

Who Is Behind the Hacks?

Every day there's another report of a computer hack. Yesterday it was a video game company and a U.S. Senate database. And today it could be the Federal Reserve...

Arrests in Spain Don't Mean Sony's Troubles Are Over
From ACM News

Arrests in Spain Don't Mean Sony's Troubles Are Over

The Spanish police say they've taken down three of the people allegedly behind the massive PlayStation Network security breach in April. But while it's probably...

Andy Rubin: Why Android Is Only Quasi-Open
From ACM News

Andy Rubin: Why Android Is Only Quasi-Open

Android is open-source software, but it doesn't come with much of an open-source community, and the Google leader of the project explained why.

Ralph Langner on Stuxnet, Copycat Threats
From ACM News

Ralph Langner on Stuxnet, Copycat Threats

A year ago, Ralph Langner was plugging away in relative obscurity, doing security consulting work for the industrial control system industry in his Hamburg headquarters...

Bin Laden's Computers Will Test U.s. Forensics
From ACM News

Bin Laden's Computers Will Test U.s. Forensics

For the U.S. government, the raid on Osama bin Laden's compound in Pakistan represents a unique opportunity to test advanced computer forensics techniques called...

Sohaib Athar on Twitter Fame After Bin Laden Raid (q&a)
From ACM Opinion

Sohaib Athar on Twitter Fame After Bin Laden Raid (q&a)

As U.S. special forces assaulted Osama bin Laden's walled compound in Pakistan, a Twitter user was already recording a rough outline of the events to come.  Sohaib...

Who Is Epsilon and Why Does It Have My Data?
From ACM News

Who Is Epsilon and Why Does It Have My Data?

If you didn't get an email warning this week that your name and email address were part of a database that was breached, consider yourself lucky, and unique.

From ACM News

Egypt's Internet Goes Dark During Political ­nrest

Egypt has gone offline.

Researchers Turn Usb Cable Into Attack Tool
From ACM TechNews

Researchers Turn Usb Cable Into Attack Tool

George Mason University researchers were scheduled to demonstrate a computer device attack using a USB cable at the Black Hat DC conference. 

Senate to Try Again on Controversial Antipiracy Bill
From ACM TechNews

Senate to Try Again on Controversial Antipiracy Bill

The U.S. Senate judiciary committee will renew its effort to pass the Combating Online Infringement and Counterfeits Act this spring, which would give the government...

Web Giants Get Bigger, Location Takes Off
From ACM News

Web Giants Get Bigger, Location Takes Off

The easiest way to sum up the Web in 2010 is that it was a year of growth. The big got bigger and smaller companies came out of the woodwork with new plays on...

Wikileaks Armors Itself to Survive Cyberattacks
From ACM News

Wikileaks Armors Itself to Survive Cyberattacks

As its operations have come under increasing financial and political pressure, WikiLeaks has quietly bolstered its electronic defenses in an attempt to become...

Wikileaks Files Detail ­.s. Electronic Surveillance
From ACM News

Wikileaks Files Detail ­.s. Electronic Surveillance

Secretary of State Hillary Clinton ordered clandestine surveillance of United Nations leadership, including obtaining "security measures, passwords, personalWikiLeaks...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account