acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorNew Scientist
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Wired Is the New Wireless: Spreading the Web in China
From ACM News

Wired Is the New Wireless: Spreading the Web in China

It's not easy to give over 1.3 billion people access to the internet—especially if that population is spread across a vast area that ranges from hinterland to sprawling...

Cheap Chips Herald Future of Wave and Pay
From ACM News

Cheap Chips Herald Future of Wave and Pay

Small, cheap smart-tag devices that are printed as digital circuits in rolls like newspapers could help kickstart the wireless payment industry. The devices, known...

Micro-Drones: The New Face of Cutting-Edge Warfare
From ACM News

Micro-Drones: The New Face of Cutting-Edge Warfare

Micro-aerial vehicles (MAVs) with uncanny navigation and real-time mapping capabilities could soon be zipping through indoor and outdoor spaces, running reconnaissance...

Online Friendships Light ­p Shadow Social Networks
From ACM News

Online Friendships Light ­p Shadow Social Networks

Friending someone on Facebook makes an association public, but many relationships are never professed online.

Gps Loss Kicked Off Fatal Drone Crash
From ACM News

Gps Loss Kicked Off Fatal Drone Crash

Hopes that a new breed of commercial drones can be easily integrated into civilian airspace have been dashed after it was revealed that the loss of the technology...

'bullet Time' to Stop Cyber Attacks on Power Grids
From ACM News

'bullet Time' to Stop Cyber Attacks on Power Grids

In The Matrix, the famous "bullet time" effect showed how Keanu Reeves's character Neo was able to sway out of the path of incoming bullets, as time appeared to...

Nash's Beautiful Mind Pre-Empted Million-Dollar Puzzle
From ACM News

Nash's Beautiful Mind Pre-Empted Million-Dollar Puzzle

John Nash's mind is even more exquisite than we thought. The Nobel laureate, famous for both his work in game theory and his schizophrenia—as portrayed in the book...

From ACM News

Telepathy Machine Reconstructs Speech from Brainwaves

When you read this sentence to yourself, it's likely that you hear the words in your head. Now, in what amounts to technological telepathy, others are on the verge...

Smarter Password Checker Lets You Compare With Others
From ACM TechNews

Smarter Password Checker Lets You Compare With Others

Researchers have developed a system designed to rate passwords relative to those already stored in a Web site's database. The password checker can tell users if...

From ACM News

Cyberwar Storm Clouds Are Gathering

Cyberspace. Some call it the new domain of war, after land, sea, air, and space.

Casino Cheats Snared by Smart Camera System
From ACM News

Casino Cheats Snared by Smart Camera System

People trying to cheat in casinos may soon be taking more of a gamble than they realise. Grosvenor Casinos, a major UK chain, is assessing software that can spot...

From ACM News

Quantum Keys Let Submarines Talk Securely

Submarines must be able to talk securely with remote naval bases while remaining submerged. Could quantum communications allow them to pull off this technically...

Quantum Hackers: Cracking the ­ncrackable Code
From ACM TechNews

Quantum Hackers: Cracking the ­ncrackable Code

Norwegian University of Science and Technology researcher Vadim Makarov has developed a quantum cryptography method to defend against attacks of quantum key distribution...

Air Traffic System Vulnerable to Cyber Attack
From ACM TechNews

Air Traffic System Vulnerable to Cyber Attack

Automatic Dependent Surveillance-Broadcast (ADS-B) technology uses unencrypted global positioning system signals to broadcast a plane's position to networks. The...

Dumping Friends on Facebook Helps Make You Secure
From ACM TechNews

Dumping Friends on Facebook Helps Make You Secure

Arizona State University researcher Pritam Gundecha has developed a method for determining which Facebook friends are most likely to leak private information. 

From ACM TechNews

Image Searches 'poisoned' By Cybercriminals

More than 113 million Internet users were redirected to malicious pages due to search engine poisoning in May 2011, according to Trend Micro. 

Face Recognition Technology Fails to Find U.k. Rioters
From ACM News

Face Recognition Technology Fails to Find U.k. Rioters

The response was as aggressive and swift as the riots themselves. Within a few hours of the worst of the looting across London and other English cities, attempts...

'Fluid Cloak' to Help Submarines Leave No Wake
From ACM News

'Fluid Cloak' to Help Submarines Leave No Wake

Super-stealthy submarines may one day glide through the water without creating a wake, if a plan to channel fluid intelligently around objects can be made to...

From ACM News

Why Bitcoin Is Not As Anonymous As Most ­sers Think

People who use Bitcoin to ensure their purchases remain anonymous may want to reconsider their reliance on the online peer-to-peer currency, say researchers who...

From ACM News

Welcome to the Age of the Splinternet

Openness is the Internet's great strength—and weakness. With powerful forces carving it up, is its golden age coming to an end?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account