acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorForbes
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cryptographers Demonstrate New Crack For Common Web Encryption
From ACM News

Cryptographers Demonstrate New Crack For Common Web Encryption

It's long been known that one of the oldest and most widely used standards for encrypting Web sites has some serious weaknesses. But one group of researchers has...

Here's What Law Enforcement Can Recover From a Seized Iphone
From ACM News

Here's What Law Enforcement Can Recover From a Seized Iphone

You may think of your iPhone as a friendly personal assistant. But once it’s alone in a room full of law enforcement officials, you might be surprised at the revealing...

Google Offers $3.14159 Million in Total Rewards For Chrome Os Hacking Contest
From ACM Careers

Google Offers $3.14159 Million in Total Rewards For Chrome Os Hacking Contest

Google has never been stingy when it comes to paying for information about security vulnerabilities in products.

Security Flaw In Common Keycard Locks Exploited In String Of Hotel Room Break-Ins
From ACM News

Security Flaw In Common Keycard Locks Exploited In String Of Hotel Room Break-Ins

Whoever robbed Janet Wolf's hotel room did his work discreetly.

How I Accidentally Helped Compromise the Secret Keys of High-Security Handcuffs
From ACM Opinion

How I Accidentally Helped Compromise the Secret Keys of High-Security Handcuffs

In the age of freely available modeling software, laser cutters and 3D printers, shapes that must stay secret for security's sake don't stay secret for long. Especially...

U.s. Law Enforcement Is Tracking Who Calls, Texts, and Emails Whom More Often Than Ever Before
From ACM News

U.s. Law Enforcement Is Tracking Who Calls, Texts, and Emails Whom More Often Than Ever Before

Law enforcement isn't just interested in what Americans are saying on the phone or on the Internet.

Meet 'rakshasa,' The Malware Infection Designed To Be ­ndetectable And Incurable
From ACM News

Meet 'rakshasa,' The Malware Infection Designed To Be ­ndetectable And Incurable

Malicious software, like all software, gets smarter all the time. In recent years it’s learned to destroy physical infrastructure, install itself through Microsoft...

Want To Find Jay-Z's Or Bill Gates' Private Jets? Openbarr Tracks 'untrackable' Flights
From ACM News

Want To Find Jay-Z's Or Bill Gates' Private Jets? Openbarr Tracks 'untrackable' Flights

Good news for paparazzi, stalkers, and corporate spies: "Private" jets are about to become significantly less private.

DARPA-Funded Researcher Can Take Over Android And Nokia Phones By Merely Waving Another Device Near Them
From ACM News

DARPA-Funded Researcher Can Take Over Android And Nokia Phones By Merely Waving Another Device Near Them

Smartphones' growing adoption of so-called "near field communications" promises to let the device in your pocket wirelessly make payments, beam info to other phones...

New Grad Looking For a Job? Pentagon Contractors Post Openings For Black-Hat Hackers
From ACM Careers

New Grad Looking For a Job? Pentagon Contractors Post Openings For Black-Hat Hackers

Mikko Hypponen enjoys his position as the chief research officer at the Helsinki-based security firm F-Secure. He has no intention of leaving. But lately, he's...

DARPA-Funded Hacker's Tiny $50 Spy Computer Hides in Offices, Drops From Drones
From ACM TechNews

DARPA-Funded Hacker's Tiny $50 Spy Computer Hides in Offices, Drops From Drones

A U.S. Defense Advanced Research Projects Agency researcher has developed the Falling or Ballistically-launched Object that Makes Backdoors (F-BOMB), a sensor-equipped...

Could A Crypto-Computer in Your Pocket Replace All Passwords?
From ACM TechNews

Could A Crypto-Computer in Your Pocket Replace All Passwords?

Cambridge University researcher Frank Stajano recently presented a paper on the Pico, a tiny, portable computer that functions as the authenticator for potentially...

DARPA Will Spend $20 Million to Search For Crypto's Holy Grail
From ACM TechNews

DARPA Will Spend $20 Million to Search For Crypto's Holy Grail

The U.S. Defense Advanced Research Projects Agency (DARPA) plans to spend $20 million over five years to find a way to both encrypt data and let it be used and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account