acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorNetwork World
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Cyberattack-Alert System Could Be Model For U.s.

Washington is in the process of deploying a statewide system that will provide early warnings about cybersecurity threats to participating organizations and the...

From ACM News

20 Hot It Security Issues

From malware on Google's Android phones to the U.S. Defense Advanced Research Projects Agency trying to understand how stories or narratives impact security and...

From ACM TechNews

Will Feds Mandate Internet Routing Security?

Resource Public Key Infrastructure developed the U.S. Department of Homeland Security allows network operators to verify that they have the ability to route traffic...

From ACM TechNews

Mit Researchers Tout Network Intrusion Recovery System

Massachusetts Institute of Technology researchers are developing RETRO, a system designed to make it easier for organizations to recover from security breaches. ...

From ACM TechNews

DARPA Takes Aim at Insider Threats

The U.S. Defense Advanced Research Projects Agency is seeking to address security threats by launching a new initiative to enable security staff to rapidly detect...

­.s. Military Wants to Exert Influence Over Private Cyber Infrastructure
From ACM TechNews

­.s. Military Wants to Exert Influence Over Private Cyber Infrastructure

The U.S. military wants more authority to protect the nation's cyberinfrastructure because it depends on power grids, transportation networks, and financial systems...

From ACM TechNews

Researchers ­nsheathe New Tool to Battle Botnets

University of Illinois at Urbana-Champaign researchers have developed a method to use a botnet's own technology to defeat it. 

Archive Project Will Digitize Wwii Enigma Messages
From ACM TechNews

Archive Project Will Digitize Wwii Enigma Messages

British historians have launched a project to digitize messages intercepted from Germany's Enigma machine during World War II. The encrypted messages were decoded...

From ACM TechNews

Commerce Department Scrutinizes Internet Privacy

The U.S. Commerce Department and various government agencies are creating an Internet Policy Task Force to examine policy frameworks and ways in which the "challenges...

From ACM TechNews

Steganography Discovery Could Help Data Thieves, But Also Improve Radar, Sonograms

The technology for instruments used to see through fog also could be used for optical steganography, according to a team of researchers at Princeton University. ...

From ACM TechNews

U.s. One Step Closer to Cyber Guards For Nation's Electric Grid

The bidding for a National Electric Sector Cyber Security Organization that would shield the U.S. electrical grid from cyberattacks was officially opened up by...

Researchers Sound Alarm on Web App 'side Channel' Data Leaks
From ACM TechNews

Researchers Sound Alarm on Web App 'side Channel' Data Leaks

Researchers who have tested the security of popular online tax, health, investing, and search sites report that the Web applications are becoming more vulnerable...

Obama Cyber Czar Choice Worries About Smartphones, Social Networking
From ACM TechNews

Obama Cyber Czar Choice Worries About Smartphones, Social Networking

Howard Schmidt, U.S. President Obama's choice for cybersecurity czar, has previously worked in both the public and private security sectors and also has written...

Are Nations Paying Criminals for Botnet Attacks?
From ACM TechNews

Are Nations Paying Criminals for Botnet Attacks?

Countries that want to disrupt other nations' government, banking, and media resources can simply hire cybercriminals to launch botnet attacks, according to new...

From ACM TechNews

Prototype Security Software Blocks Ddos Attacks

Auburn University researchers have developed a software filter that protects computers against distributed denial-of-service (DDoS) attacks without bogging down...

From ACM TechNews

Domain-Name Abuse Proliferates; Rogue Registrars Turn a Blind Eye

Domain name abuse continues to be a serious problem, which is too often proliferated by some registrars who are willing to overlook phony registration information...

Still Trying to Crack Nazi Enigma Messages
From ACM TechNews

Still Trying to Crack Nazi Enigma Messages

Enigma@home is attempting to break one of three original messages generated by the Enigma machine, which was intercepted by the Allies in 1942. The Enigma M4 machine...

Lawmakers Strike New Tone With Proposed Cybersecurity Bill
From ACM TechNews

Lawmakers Strike New Tone With Proposed Cybersecurity Bill

The second draft of a U.S. Senate cybersecurity bill scales back language that would give the president the ability to shut down the Internet in an emergency....

From ACM TechNews

Dns Remains Vulnerable One Year After Kaminsky Bug

In the year since security researcher Dan Kaminsky discovered a vulnerability in the domain name system (DNS), which could allow hackers to redirect traffic from...

From ACM TechNews

How Networking Is Transforming Healthcare

High-speed computer networks have the potential to transform the healthcare industry, according to Mike McGill, program director for Internet2's Health Sciences...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account