acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorIDG News Service
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Will AI ­sher in a New Era of Hacking?
From ACM TechNews

Will AI ­sher in a New Era of Hacking?

Advanced artificial intelligence systems developed to defend assets in cyberspace might be turned to malevolent purposes by cybercriminals.

Vint Cerf's Dream Do-Over: 2 Ways He'd Make the Internet Different
From ACM TechNews

Vint Cerf's Dream Do-Over: 2 Ways He'd Make the Internet Different

Google chief Internet evangelist and former ACM president Vint Cerf said he would change a few things about the Internet's creation if he could do it over again...

­.s. Pumps $400 Million Into Next-Generation Wireless Research
From ACM TechNews

­.s. Pumps $400 Million Into Next-Generation Wireless Research

The U.S. National Science Foundation will invest more than $400 million over the next seven years to fund next-generation wireless research.

Eu Plans $2b Investment in Cybersecurity Research
From ACM TechNews

Eu Plans $2b Investment in Cybersecurity Research

The European Union is contributing $500 million to fund research into cybersecurity, and is asking the private sector to contribute an additional $1.5 billion.

Tor Project Says It Can Quickly Catch Spying Code
From ACM TechNews

Tor Project Says It Can Quickly Catch Spying Code

A Tor Project developer reports the project is enhancing its software to rapidly detect tampering to its network for the purpose of surveillance. 

A New Algorithm From MIT Could Protect Ships From 'rogue Waves' at Sea
From ACM TechNews

A New Algorithm From MIT Could Protect Ships From 'rogue Waves' at Sea

Massachusetts Institute of Technology researchers have developed a predictive tool that could give ships a two- to three-minute advance warning of approaching rogue...

Millions of Sensitive Records Exposed By Mobile Apps Leaking Back-End Credentials
From ACM TechNews

Millions of Sensitive Records Exposed By Mobile Apps Leaking Back-End Credentials

Researchers have found thousands of mobile applications implement cloud-based, back-end services in a way that lets anyone access sensitive records created by users...

Xerox Parc's New Chip Will Self Destruct in 10 Seconds
From ACM TechNews

Xerox Parc's New Chip Will Self Destruct in 10 Seconds

Engineers at Xerox PARC have developed a chip that can self-destruct upon command, making it potentially suitable for high-security applications.

Even Encrypted Medical Record Databases Leak Information
From ACM TechNews

Even Encrypted Medical Record Databases Leak Information

Many types of databases used for electronic medical records are vulnerable to leaking information, according to a new study from Microsoft researchers.  

Tired of Memorizing Passwords? A Turing Award Winner Came ­p With This Algorithmic Trick
From ACM TechNews

Tired of Memorizing Passwords? A Turing Award Winner Came ­p With This Algorithmic Trick

ACM A.M. Turing Award recipient Manuel Blum believes online passwords can be made more secure by creating what he calls "human computable" passwords.  

Why the World's Top Computing Experts Are Worrying About Your Data
From ACM TechNews

Why the World's Top Computing Experts Are Worrying About Your Data

Many of the world's top computer science experts met last week to determine how the widespread collection of data about consumers can be prevented from causing...

Vint Cerf: 'sometimes I'm Terrified' By the Iot
From ACM TechNews

Vint Cerf: 'sometimes I'm Terrified' By the Iot

Google chief Internet evangelist Vint Cerf says he finds certain aspects of the Internet of Things particularly worrisome. 

Internet Voting Not Ready Yet, but Can Be Made More Secure
From ACM TechNews

Internet Voting Not Ready Yet, but Can Be Made More Secure

Online voting systems lack sufficient security to ensure accurate vote counts, but election officials could take steps to improve their security and transparency...

How Encryption Keys Could Be Stolen By Your Lunch
From ACM TechNews

How Encryption Keys Could Be Stolen By Your Lunch

Researchers from Tel Aviv University have developed an easily concealable device that can deduce encryption keys by sniffing the electromagnetic leakage from a...

Hacker Turns Toy Into Tool That Can Open Garage Doors in Seconds
From ACM TechNews

Hacker Turns Toy Into Tool That Can Open Garage Doors in Seconds

Security researcher Samy Kamkar has developed an attack for fixed-code garage door openers. 

Free Tool Reveals Mobile Apps Sending Unencrypted Data
From ACM TechNews

Free Tool Reveals Mobile Apps Sending Unencrypted Data

A new program will allow people to test whether their mobile data is protected. 

Researchers Find Same Rsa Encryption Key ­sed 28,000 Times
From ACM TechNews

Researchers Find Same Rsa Encryption Key ­sed 28,000 Times

Researchers at Royal Holloway, University of London have found that several million Internet hosts are still vulnerable to the FREAK flaw in the SSL/TLS encryption...

To Avert Another Heartbleed, Open Source Group Narrows List of Projects in Need of Support
From ACM TechNews

To Avert Another Heartbleed, Open Source Group Narrows List of Projects in Need of Support

The Core Infrastructure Initiative was formed to identify and provide extra funding to critical open source projects that need help ensuring the security of their...

Mass Surveillance 'endangers Fundamental Human Rights,' Says Study
From ACM TechNews

Mass Surveillance 'endangers Fundamental Human Rights,' Says Study

A leading European human rights body warns mass Internet surveillance is a threat to basic human privacy rights and has not apparently prevented terrorist attacks...

Fujitsu Psychology Tool Profiles ­sers for Risk of Cyberattacks
From ACM TechNews

Fujitsu Psychology Tool Profiles ­sers for Risk of Cyberattacks

Fujitsu researchers are integrating psychology into profiling software to make computer security more personalized. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account