acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Rules For Cyberwarfare Still ­nclear, Even as ­.s. Engages In It
From ACM News

Rules For Cyberwarfare Still ­nclear, Even as ­.s. Engages In It

When Defense Secretary Ashton Carter landed in Iraq for a surprise visit this week, he came armed with this news: More than 200 additional U.S. troops are headed...

Software Flags 'Suicidal' Students, Presenting Privacy Dilemma
From ACM News

Software Flags 'Suicidal' Students, Presenting Privacy Dilemma

Ken Yeh is the director of technology at Ontario Christian Schools, a private K-12 school near Los Angeles with about 100 children per grade.

At Supreme Court, Debate Over Phone Privacy Has A Long History
From ACM News

At Supreme Court, Debate Over Phone Privacy Has A Long History

Underlying the debate over Apple's refusal to help the FBI unlock the iPhone of San Bernardino shooter Syed Rizwan Farook is the idea that cellphones hold the most...

Advertising Company Will ­se Its Billboards To Track Passing Cellphones
From ACM News

Advertising Company Will ­se Its Billboards To Track Passing Cellphones

Clear Channel Outdoor—one of the largest outdoor advertising companies in the U.S.—is starting a new program called Radar that will use billboards to map real-world...

In Fighting FBI, Apple Says Free Speech Rights Mean No Forced Coding
From ACM News

In Fighting FBI, Apple Says Free Speech Rights Mean No Forced Coding

The Justice Department wants Apple to write special software to help it break into the iPhone used by one the San Bernardino terrorists.

China's Internet Forum May Provide a Peek at Its Cyber-Ambitions
From ACM News

China's Internet Forum May Provide a Peek at Its Cyber-Ambitions

Heads of state, including the prime ministers of Pakistan and Russia, and major technology firms will gather Wednesday in Wuzhen, a picturesque little town of canals...

What Can—or Should—internet Companies Do to Fight Terrorism?
From ACM News

What Can—or Should—internet Companies Do to Fight Terrorism?

After the recent attacks in Paris and in San Bernardino, Calif., social media platforms are under pressure from politicians to do more to take down messages and...

Could Your Social Media Footprint Step On Your Credit History?
From ACM News

Could Your Social Media Footprint Step On Your Credit History?

In December 1912, financier John Pierpont "J.P." Morgan testified in Washington before the Bank and Currency Committee of the House of Representatives investigating...

It's Not Just Vw: A Robust Market For Reprogramming Vehicles
From ACM News

It's Not Just Vw: A Robust Market For Reprogramming Vehicles

Lawmakers want to know more about Volkswagen's massive cheat—how the automaker used software to crank up the power on a vehicle, and then hide the fact.

How Close Are We Really to a Robot-Run Society?
From ACM Opinion

How Close Are We Really to a Robot-Run Society?

From Rosie, the Jetsons' robot maid, to Arnold Schwarzenegger's cyborg in The Terminator, popular culture has frequently conceived of robots as having a human-like...

Diy Tractor Repair Runs Afoul of Copyright Law
From ACM News

Diy Tractor Repair Runs Afoul of Copyright Law

The iconic image of the American farmer is the man or woman who works the land, milks cows and is self-reliant enough to fix the tractor. But like a lot of mechanical...

Biometrics May Ditch the Password, But Not the Hackers
From ACM News

Biometrics May Ditch the Password, But Not the Hackers

Passwords get hacked—a lot.

After Snowden, the Nsa Faces Recruitment Challenge
From ACM Careers

After Snowden, the Nsa Faces Recruitment Challenge

Daniel Swann is exactly the type of person the National Security Agency would love to have working for it.

Someday Soon, You May Pay Your Restaurant Bill With A Retina Scan
From ACM News

Someday Soon, You May Pay Your Restaurant Bill With A Retina Scan

The past 30 years have seen payments shift from cash and checks to debit cards and websites, and most recently to mobile phone apps, including Apple Pay and ...

When Hackers Test For Flaws, They Might Earn Cash—or Threats
From ACM Careers

When Hackers Test For Flaws, They Might Earn Cash—or Threats

To hack or not to hack?

Big Data Firm Says It Can Link Snowden Data to Changed Terrorist Behavior
From ACM News

Big Data Firm Says It Can Link Snowden Data to Changed Terrorist Behavior

For nearly a year, U.S. government officials have said revelations from former NSA contract worker Edward Snowden harmed national security and allowed terrorists...

Switzerland: From Banking Paradise To Data Safe Zone
From ACM Careers

Switzerland: From Banking Paradise To Data Safe Zone

Stash gold in a Swiss bank? It's old hat. Try something really valuable: data.

Nsa Implementing Fix to Prevent Snowden-Like Security Breach
From ACM Opinion

Nsa Implementing Fix to Prevent Snowden-Like Security Breach

A year after Edward Snowden's digital heist, the NSA's chief technology officer says steps have been taken to stop future incidents. But he says there's no way...

Software That Sees Employees, Not Outsiders, As the Real Threat
From ACM Careers

Software That Sees Employees, Not Outsiders, As the Real Threat

A growing number of companies are under pressure to protect sensitive data—and not just from hackers lurking outside the digital walls.

Going Dark: The Internet Behind the Internet
From ACM News

Going Dark: The Internet Behind the Internet

The average computer user with an Internet connection has access to an amazing wealth of information. But there's also an entire world that's invisible to your...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account