acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorNetwork World
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How to Make Fully Homomorphic Encryption 'practical and ­sable'
From ACM TechNews

How to Make Fully Homomorphic Encryption 'practical and ­sable'

The U.S. Intelligence Advanced Research Projects Activity has awarded Galois $1 million to make fully homomorphic encryption available to programmers.

Intelligence Agency Opens $325,000 Advanced, Automated Fingerprint Gathering Competition
From ACM TechNews

Intelligence Agency Opens $325,000 Advanced, Automated Fingerprint Gathering Competition

The U.S. Intelligence Advanced Research Projects Activity's newest contest challenges participants to build an automated fingerprint collection system that matches...

Researchers Create 3D Faces From Online Photos to Defeat Face Authentication Systems
From ACM TechNews

Researchers Create 3D Faces From Online Photos to Defeat Face Authentication Systems

Researchers say they have developed a virtual reality-based cyberattack that can reproduce the human face well enough to trick face-authentication systems.

Headaches Likely to Grow Over Auto Cybersecurity Concerns
From ACM TechNews

Headaches Likely to Grow Over Auto Cybersecurity Concerns

Issues related to automobile cybersecurity are likely to increase, but U.S. auto cybersecurity standards are not expected until at least 2018. 

DARPA $2m Contest Looks to Bring AI to Wireless Spectrum Provisioning
From ACM TechNews

DARPA $2m Contest Looks to Bring AI to Wireless Spectrum Provisioning

The U.S. Defense Advanced Research Projects Agency recently announced the $2-million Spectrum Collaboration Challenge.

World's Top Cryptographers on Encryption Backdoors: No Way
From ACM TechNews

World's Top Cryptographers on Encryption Backdoors: No Way

A panel of leading cryptographers at this week's RSA Conference agreed inserting backdoors to unscramble encrypted communications is a threat to confidentiality...

Algorithm Developed to Predict Future Botnet Attacks
From ACM TechNews

Algorithm Developed to Predict Future Botnet Attacks

Researchers from Ben-Gurion University in Israel have developed an algorithm that can trace botnets back to their perpetrators. 

British Voice Encryption Protocol Has Massive Weakness, Researcher Says
From ACM TechNews

British Voice Encryption Protocol Has Massive Weakness, Researcher Says

A researcher charges the protocol created by a U.K. governmental group to encrypt voice calls has a weakness built into it by design that could enable mass surveillance...

Image Too Good to Be True? DARPA Program Targets Image Doctoring
From ACM TechNews

Image Too Good to Be True? DARPA Program Targets Image Doctoring

The U.S. Defense Advanced Research Projects Agency wants to develop an easy-to-use toolset to detect altered images.

Can Myriad Wireless Networks Connect as One Fast, Secure System?
From ACM TechNews

Can Myriad Wireless Networks Connect as One Fast, Secure System?

U.S. Defense Advanced Research Projects Agency researchers are working on a program that aims to solve critical wireless technology problems. 

How Keystroking Style Could Replace Passwords For Authentication
From ACM TechNews

How Keystroking Style Could Replace Passwords For Authentication

Researchers at Jeppiaar Engineering College in Chennai, India, have developed a biometric keystroke algorithm that learns how the user types.

Stanford Crypto Expert Dan Boneh Wins $175k Computer Science Award
From ACM TechNews

Stanford Crypto Expert Dan Boneh Wins $175k Computer Science Award

Stanford University professor Dan Boneh's contributions to cryptography have earned him the 2014 ACM-Infosys Foundation Award in Computing Sciences.

Shortage of Security Pros Worsens
From ACM TechNews

Shortage of Security Pros Worsens

Cybersecurity job postings grew 74 percent from 2007 to 2013, more than twice the rate of all information technology jobs, according to a Burning Glass study. 

U.s. Intelligence Wants High-Tech Access to the Most Prodigious Sensor of All: Humans
From ACM TechNews

U.s. Intelligence Wants High-Tech Access to the Most Prodigious Sensor of All: Humans

The U.S. Intelligence Advanced Research Projects Activity is doing research for its Future Applications of Sense Technology for Fidelitous Wearable Devices program...

DARPA Wants to Toughen-­p Wan Edge Networking, Security
From ACM TechNews

DARPA Wants to Toughen-­p Wan Edge Networking, Security

The U.S. Defense Advanced Research Projects Agency wants to improve networking and security at the wide area network edge.

Tim Berners-Lee Wants Internet Magna Carta to Guarantee Netizens' Privacy
From ACM TechNews

Tim Berners-Lee Wants Internet Magna Carta to Guarantee Netizens' Privacy

Sir Tim Berners-Lee is using the 25th anniversary of his invention of the World Wide Web to push for an Internet bill of rights.

Hacking Traffic Lights With a Laptop Is Easy
From ACM TechNews

Hacking Traffic Lights With a Laptop Is Easy

Security researchers with permission from local road authorities hacked into nearly 100 wirelessly networked traffic lights and were able to change the lights on...

Researchers Dare AI Experts to Crack New Gotcha Password Scheme
From ACM TechNews

Researchers Dare AI Experts to Crack New Gotcha Password Scheme

Carnegie Mellon University researchers have developed GOTCHA, Generating panOptic Turing Tests to Tell Computers and Humans Apart, a password system based on visual...

New Standard/tool Address Security Dependencies
From ACM TechNews

New Standard/tool Address Security Dependencies

The standards organization Open Group has created a standard for modeling security dependencies. The "Dependency Modeling Standard" will enable the military and...

DARPA Program Aims to Find, Shut Backdoor Malware Holes in Commercial It Devices
From ACM TechNews

DARPA Program Aims to Find, Shut Backdoor Malware Holes in Commercial It Devices

DARPA's Vetting Commodity IT Software and Firmware program aims to develop systems that can verify the security of commercial IT devices.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account