acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorScientific American
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


AI Creates False Documents That Fake Out Hackers
From ACM News

AI Creates False Documents That Fake Out Hackers

The algorithm hides sensitive information in a sea of decoys.

Encryption System Protects Data from Quantum Computers
From ACM TechNews

Encryption System Protects Data from Quantum Computers

IBM researchers have demonstrated a quantum-proof encryption method called CRYSTALS that can successfully encrypt a magnetic-tap storage device.  

Machines That Read Your Brain Waves
From ACM News

Machines That Read Your Brain Waves

Sometimes a technology that's been simmering in the laboratory or the clinic for decades makes the leap to mainstream consumption almost overnight.

Are Cyborg Warriors a Good Idea?
From ACM News

Are Cyborg Warriors a Good Idea?

You already have a lot to worry about. Climate change, fake news, inequality, the stability of democracy. But I feel obliged to point out yet another threat: soldiers...

What Does a Crooked Election Look Like?
From ACM News

What Does a Crooked Election Look Like?

For voters around the world, including the millions of Americans who will cast ballots in the midterms up to and on November 6, an election is democracy in action—an...

How to Make a Robot ­se Theory of Mind
From ACM News

How to Make a Robot ­se Theory of Mind

Imagine standing in an elevator as the doors begin to close and suddenly seeing a couple at the end of the corridor running toward you.

How Cryptojacking Can Corrupt the Internet of Things
From ACM News

How Cryptojacking Can Corrupt the Internet of Things

Cyber criminals shut down parts of the Web in October 2016 by attacking the computers that serve as the internet's switchboard.

How Twitter Bots Help Fuel Political Feuds
From ACM TechNews

How Twitter Bots Help Fuel Political Feuds

Researchers in the U.S. and China are studying a "misinformation network" related to the 2016 U.S. presidential election.

Spot the Fake: Artificial Intelligence Can Produce Lifelike Photographs
From ACM News

Spot the Fake: Artificial Intelligence Can Produce Lifelike Photographs

Fraudulent images have been around for as long as photography itself. Take the famous hoax photos of the Cottingley fairies or the Loch Ness monster.

Meltdown and Spectre Expose the Dark Side of Superfast Computers
From ACM Opinion

Meltdown and Spectre Expose the Dark Side of Superfast Computers

Hundreds of gadget makers and software companies at this week's annual Consumer Electronics Show (CES) in Las Vegas are staking the success of their newest products...

The Evolution of Trust in a Digital Economy
From ACM News

The Evolution of Trust in a Digital Economy

To participate in today's global economy, ordinary people must accept an asymmetrical bargain: their lives are transparent to states, banks and corporations, whereas...

Could AI Be the Future of Fake News and Product Reviews?
From ACM TechNews

Could AI Be the Future of Fake News and Product Reviews?

Researchers are experimenting with artificial intelligence-based techniques for automatically generating convincing online reviews, such as bogus restaurant critiques...

The Imperfect Crime: How the Wannacry Hackers Could Get Nabbed
From ACM News

The Imperfect Crime: How the Wannacry Hackers Could Get Nabbed

When hackers unleashed the WannaCry "ransomware" in mid-May, not only did they wreak havoc on European hospitals, telecoms and railways, they also made off with...

When Hatred Goes Viral: Inside Social Media's Efforts to Combat Terrorism
From ACM News

When Hatred Goes Viral: Inside Social Media's Efforts to Combat Terrorism

On New Year's Eve in 2015 local and federal agents arrested a 26-year-old man in Rochester, N.Y., for planning to attack people at random later that night using...

The Pentagon's Seek-and-Destroy Mission For Counterfeit Electronics
From ACM News

The Pentagon's Seek-and-Destroy Mission For Counterfeit Electronics

The Pentagon has known for years that a significant number of the replacement parts it buys for its missile guidance and satellite systems contain substandard counterfeit...

Ghost in the Sell: Hollywood's Mischievous Vision of AI
From ACM Opinion

Ghost in the Sell: Hollywood's Mischievous Vision of AI

Watch enough science fiction movies and you'll probably come to the conclusion that humans are living on borrowed time.

New Rules For Avoiding Cyber Bugs in Medical Devices
From ACM News

New Rules For Avoiding Cyber Bugs in Medical Devices

The U.S. government on Tuesday issued rules for addressing cyber vulnerabilities in medical devices, providing manufacturers with guidelines for fixing security...

Could Obama's Threat of Retaliation Against Russia Lead to Cyberwar?
From ACM Opinion

Could Obama's Threat of Retaliation Against Russia Lead to Cyberwar?

Late last week Obama administration officials used NBC News to send Moscow a cryptic threat: The U.S. government is "contemplating an unprecedented cyber covert...

Tech Turns to Biology as Data Storage Needs Explode
From ACM TechNews

Tech Turns to Biology as Data Storage Needs Explode

Several technology companies are investigating DNA data storage.

How to Hack the Hackers: The Human Side of Cyber Crime
From ACM News

How to Hack the Hackers: The Human Side of Cyber Crime

Say what you will about cybercriminals, says Angela Sasse, "their victims rave about the customer service".
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account