acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorScience
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cyberwar Surprise Attacks Get a Mathematical Treatment
From ACM TechNews

Cyberwar Surprise Attacks Get a Mathematical Treatment

Two University of Michigan professors have written a mathematical model that could help predict the timing of cyberattacks. 

Wireless Networks Exposed as Electricity Grid Weakest Link
From ACM TechNews

Wireless Networks Exposed as Electricity Grid Weakest Link

Australian researchers have determined that hackers can exploit numerous security flaws in smart meters on the electrical power grid. 

Computers Can Be Hacked Using High-Frequency Sound
From ACM News

Computers Can Be Hacked Using High-Frequency Sound

Using the microphones and speakers that come standard in many of today's laptop computers and mobile devices, hackers can secretly transmit and receive data using...

In Cyberarms Race, North Korea Emerging As a Power, Not a Pushover
From ACM News

In Cyberarms Race, North Korea Emerging As a Power, Not a Pushover

Often dismissed as a laggard in the global cyberarms race, North Korea has long been seen as a chronic cyber-superpower wannabe.

Quantum Computers Check Each Other’s Work
From ACM TechNews

Quantum Computers Check Each Other’s Work

A new strategy for verifying the solutions of quantum computers relies on a blind quantum computing technique. 

Cyber Security in 2013: How Vulnerable to Attack Is U.s. Now?
From ACM TechNews

Cyber Security in 2013: How Vulnerable to Attack Is U.s. Now?

Last year offered many unsettling revelations for businesses, individuals, and U.S. government officials concerned about cyberattacks. There is more befuddlement...

­.k. Government Calls on Academia to Train Tomorrow's Cyber Security Experts
From ACM TechNews

­.k. Government Calls on Academia to Train Tomorrow's Cyber Security Experts

The U.K. government's Engineering and Physical Sciences Research Council has invited universities to apply for grants to run two new dedicated Centers for Doctoral...

Improving Security in the Cloud
From ACM TechNews

Improving Security in the Cloud

Weizmann Institute and MIT researchers are moving closer to developing a method for working with data while it is still encrypted, providing an encrypted result...

It's All About the Team For Research in Ubiquitous Secure Technology
From ACM TechNews

It's All About the Team For Research in Ubiquitous Secure Technology

The Team for Research in Ubiquitous Secure Technology (TRUST) is a university and industry consortium that studies cybersecurity issues related to health care,...

Human Body Vulnerable to Cyberattack
From ACM TechNews

Human Body Vulnerable to Cyberattack

Security researcher Jay Radcliffe has demonstrated how a hacker could remotely attack medical devices used to treat diabetes. 

The Science of Cyber Security
From ACM TechNews

The Science of Cyber Security

The University of California, Berkeley's Team for Research in Ubiquitous Secure Technology (TRUST) is developing cybersecurity science and technology designed...

Information Flow Can Reveal Dirty Deeds
From ACM News

Information Flow Can Reveal Dirty Deeds

Political thrillers that portray a "web of corruption" get it all wrong, at least according to an analysis of emails between Enron employees. The flow of the...

FBI Set to Kill Secret-Stealing Russian 'Botnet.' Is Your Computer Infected?
From ACM TechNews

FBI Set to Kill Secret-Stealing Russian 'Botnet.' Is Your Computer Infected?

The U.S. Federal Bureau of Investigation has seized control of a Russian botnet that commandeered millions of personal computers that may have penetrated U.S. diplomatic...

From ACM News

Diamond Could Store Quantum Information

Could be that diamonds are a geek’s best friend. Scientists have developed a new way to manipulate atoms inside diamond crystals so that they store information...

From ACM News

Effort Seeks to Diversify Cyber-Security Field

In an effort to increase the number of women and minorities in the field of cyber security, Missouri University of Science and Technology is working with the University...

Cell Phone Alerts to Warn Residents of Danger
From ACM News

Cell Phone Alerts to Warn Residents of Danger

Two U.S. Department of Homeland Security offices are working with wireless carriers to develop a national capability to send emergency alerts to mobile devices....

From ACM News

Crowdsourcing Peer Review

It is the greatest question in computer science. A negative answer would likely give a fundamentally deeper understanding of the nature of computation. And a...

From ACM TechNews

Vulnerability in Commercial Quanto Cryptography

Researchers at the Norwegian University of Science and Technology, the University of Erlangen-Nurnberg, and the Max Planck Institute for the Science of Light have...

Scientists Take Aim at Website Hackers
From ACM News

Scientists Take Aim at Website Hackers

With support from the U.S. National Science Foundation, a team of computer scientists is using a novel, two-pronged approach to protect websites from hackers.

From ACM TechNews

Field Experiment on a Metropolitan Quantum Cryptography Network

The University of Science and Technology of China recently demonstrated a metropolitan quantum cryptography network (QCN) for use by the government in Wuhu, China...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account