acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorScientific American
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Pentagon Paying Techies to Think Like Terrorists
From ACM Careers

Pentagon Paying Techies to Think Like Terrorists

To stop a terrorist, it helps to think like one.

Gps and the World's First 'space War'
From ACM News

Gps and the World's First 'space War'

Twenty-five years ago U.S.-led Coalition forces launched the world’s first "space war" when they drove Iraqi troops out of Kuwait.

Csi: Cyberattack Scene Investigation--a Malware Whodunit
From ACM TechNews

Csi: Cyberattack Scene Investigation--a Malware Whodunit

Forensic probes of cyberattacks can uncover their modus operandi and severity, but finding perpetrators is a difficult proposition. 

Wikipedia Turns 15
From ACM Opinion

Wikipedia Turns 15

It must be difficult for the roughly half a billion people who visit Wikipedia every month to remember a world without the free online encyclopedia.

A Quick Guide to the Cybersecurity Bill Passed By the ­.s. Senate
From ACM News

A Quick Guide to the Cybersecurity Bill Passed By the ­.s. Senate

After more than a year of bickering, stalling and revising, the Senate passed its most significant cybersecurity bill to date 74–21.

Cryptographers Brace For Quantum Revolution
From ACM News

Cryptographers Brace For Quantum Revolution

It is an inevitability that cryptographers dread: the arrival of powerful quantum computers that can break the security of the Internet. Although these devices...

A Computer's Heat Could Divulge Top Secrets
From ACM News

A Computer's Heat Could Divulge Top Secrets

The most secure computers in the world can't "Google" a thing—they are disconnected from the Internet and all other networks.

What Is the Big Secret Surrounding Stingray Surveillance?
From ACM Opinion

What Is the Big Secret Surrounding Stingray Surveillance?

Given the amount of mobile phone traffic that cell phone towers transmit, it is no wonder law enforcement agencies target these devices as a rich source of data...

Here's What a Cyber Warfare Arsenal Might Look Like
From ACM News

Here's What a Cyber Warfare Arsenal Might Look Like

The Pentagon has made clear in recent weeks that cyber warfare is no longer just a futuristic threat—it is now a real one.

How Cybersecurity Became Your Problem
From ACM TechNews

How Cybersecurity Became Your Problem

Cyberattacks threaten to rise in frequency and complexity, which makes every person using modern technology a potential target. 

Cryptographers Could Prevent Satellite Collisions
From ACM News

Cryptographers Could Prevent Satellite Collisions

In February 2009 the U.S.'s Iridium 33 satellite collided with the Russian Cosmos 2251, instantly destroying both communications satellites.

Human Traffickers Caught on Hidden Internet
From ACM News

Human Traffickers Caught on Hidden Internet

In November 2012 a 28-year-old woman plunged 15 meters from a bedroom window to the pavement in New York City, a devastating fall that left her body broken but...

Shopping Habits Reveal Personal Details in 'anonymized' Data
From ACM News

Shopping Habits Reveal Personal Details in 'anonymized' Data

Details about where and when you use your credit card could help reveal your identity to data thieves—even if they don't know your name, address and other personal...

'ambiguous' Warfare Buys Upgrade Time For Russia's Military
From ACM News

'ambiguous' Warfare Buys Upgrade Time For Russia's Military

Unmarked Russian soldiers who seized Ukraine's Crimea region earlier this year gave every appearance of military professionals well equipped with modern body armor...

Squiggly Lines Secure Smartphones
From ACM News

Squiggly Lines Secure Smartphones

To protect your financial and personal data, most mobiles come with PIN-based security, biometrics or number grids that require you to retrace a particular pattern...

Electric Grid, You Have Software ­pdates Available
From ACM News

Electric Grid, You Have Software ­pdates Available

The electric grid was designed as a one-way highway, with power cascading out from big power plants to cities and towns at the end of the line.

Bitcoin Vies with New Cryptocurrencies as Coin of the Cyber Realm
From ACM News

Bitcoin Vies with New Cryptocurrencies as Coin of the Cyber Realm

At a bitcoin conference in Miami this January, Jeffrey Tucker, a laissez-faire economist and libertarian icon, made an unexpected observation.

Fact or Fiction?: Your Car Is Hackable
From ACM News

Fact or Fiction?: Your Car Is Hackable

When your home computer is hacked, the things at risk are your identity, finances and other digital assets.

How Microsoft's 1 Percenters Balance Basic Research with Short-Term Success
From ACM Opinion

How Microsoft's 1 Percenters Balance Basic Research with Short-Term Success

When Microsoft launched its research labs in 1991, the personal computer was just beginning to blossom into a worldwide phenomenon, thanks in no small part to Windows...

Software Firm Claims Breakthrough in Computer Vision Will Lead to Better AI
From ACM News

Software Firm Claims Breakthrough in Computer Vision Will Lead to Better AI

Luis von Ahn has heard it all before.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account