acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorLogan Kugler
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The War Over the Value of Personal Data
From Communications of the ACM

The War Over the Value of Personal Data

In a world increasingly dependent on turning personal data into profits, it is unclear how much that data is actually worth.

Why Is It Difficult For the Fbi to Break Into Smartphones?
From ACM News

Why Is It Difficult For the Fbi to Break Into Smartphones?

Turing Laureate Whitfield Diffie explains why the U.S. Federal Bureau of Investigation is unable to break the encryption on your smartphone.

The Quantum Threat to Cryptocurrencies
From ACM News

The Quantum Threat to Cryptocurrencies

Quantum computing could fundamentally break cryptocurrencies like Bitcoin and throw markets into turmoil.  

Law Enforcement’s Ongoing Problem with Mobile Encryption
From ACM News

Law Enforcement’s Ongoing Problem with Mobile Encryption

Organizations like the U.S. Federal Bureau of Investigation have a hard time cracking suspects' smartphones, thanks to end-to-end encryption.

Drivers, These Robots Have Your Back
From ACM News

Drivers, These Robots Have Your Back

Automated safety systems can prevent an accident before the driver is even aware of the possibility.

How a Supervillain (or a Hacker in His Basement) Could Destroy the Internet
From Communications of the ACM

How a Supervillain (or a Hacker in His Basement) Could Destroy the Internet

Network experts share their greatest fears about attacks and accidents that could destroy the Internet.

Is 'Good Enough' Computing Good Enough?
From Communications of the ACM

Is 'Good Enough' Computing Good Enough?

The energy-accuracy trade-off in approximate computing.

Online Privacy
From Communications of the ACM

Online Privacy: Regional Differences

How do the U.S., Europe, and Japan differ in their approaches to data protection — and what are they doing about it?

Keeping Online Reviews Honest
From Communications of the ACM

Keeping Online Reviews Honest

As online reviews become increasingly important to e-commerce and social media sites, computer scientists work on ways to ensure their authenticity.

Robots Compete in Disaster Scenarios
From Communications of the ACM

Robots Compete in Disaster Scenarios

The DARPA Robotics Challenge pitted teams from around the world against each other in a series of disaster-themed tasks.

Is Fingerprint Security Reliable?
From ACM News

Is Fingerprint Security Reliable?

The strength of biometric locks on Apple's and Samsung's new phones may lie in their convenience.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account