acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorScientific American
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Nsa Efforts to Evade Encryption Technology Damaged ­.s. Cryptography Standard
From ACM News

Nsa Efforts to Evade Encryption Technology Damaged ­.s. Cryptography Standard

In the three months since Edward Snowden began his whistle-blowing campaign against the National Security Agency (NSA) the former government contractor has exposed...

It’s Time to Reform the Computer Fraud and Abuse Act
From ACM News

It’s Time to Reform the Computer Fraud and Abuse Act

A bill working its way through Congress is an opportunity to update an unfair, outmoded cybersecurity law

Fact or Fiction: Encryption Prevents Digital Eavesdropping
From ACM News

Fact or Fiction: Encryption Prevents Digital Eavesdropping

Since the dawn of the Web and ubiquitous free e-mail services over the past two decades, the need to secure personal information online has been evident but often...

When Will Smartglasses and Other Wearable Computers Hit the Mainstream?
From ACM Opinion

When Will Smartglasses and Other Wearable Computers Hit the Mainstream?

Google has stoked our collective imagination via relentless promotion of its Google Glass wearable computer in recent months.

Is High-Tech Security at Public Events Counterproductive?
From ACM Opinion

Is High-Tech Security at Public Events Counterproductive?

Which is more intrusive: security screening and metal detectors every few blocks, or a drone flying high above it taking video of every little thing you do?

Crash Course: Training the Brain of a Driverless Car
From ACM News

Crash Course: Training the Brain of a Driverless Car

Early attempts at driverless cars have had little difficulty gathering the loads of data required to operate autonomously.

Fashion Statement: Designer Creates Line of Drone-Proof Garments to Protect Privacy
From ACM News

Fashion Statement: Designer Creates Line of Drone-Proof Garments to Protect Privacy

As the U.S. government draws up plans to use surveillance drones in domestic airspace, opposition to what many consider an unwarranted and significant invasionprivacy...

Small Gadgets That Make You Healthier
From ACM News

Small Gadgets That Make You Healthier

At any moment, someone in the U.S. most likely is having an asthma attack.

When Will the Internet Reach Its Limit (and How Do We Stop It from Happening)?
From ACM Opinion

When Will the Internet Reach Its Limit (and How Do We Stop It from Happening)?

The number of smartphones, tablets and other network-connected gadgets will outnumber humans by the end of the year.

Auto-Immune: 'symbiotes' Could Be Deployed to Thwart Cyber Attacks
From ACM News

Auto-Immune: 'symbiotes' Could Be Deployed to Thwart Cyber Attacks

Anti-hacker defenses have long focused mainly on protecting personal computers and servers in homes and offices.

Amateur Astronomers Scour the Sky For Government Secrets
From ACM News

Amateur Astronomers Scour the Sky For Government Secrets

Earlier this year Iran's defense minister put the world on notice: His nation had developed the ability to "easily" watch spacewalking astronauts from the ground...

Pentagon Looks to Dna from Plants to Foil Electronic Component Counterfeiters
From ACM News

Pentagon Looks to Dna from Plants to Foil Electronic Component Counterfeiters

Counterfeit electronics embedded in missile guidance systems and hundred-million-dollar aircraft have become a serious problem for the U.S. military and its contractors...

From ACM Opinion

The Coming Entanglement: Bill Joy and Danny Hillis

Digital innovators Bill Joy, co-founder of Sun Microsystems, and Danny Hillis, co-founder of the Long Now Foundation, talk with Scientific American Executive Editor...

Did a U.s. Radar Research Station Disable Russia's Phobos Probe?
From ACM News

Did a U.s. Radar Research Station Disable Russia's Phobos Probe?

Soon after the ill-fated Phobos-Grunt spacecraft stalled in Earth orbit, a former Russian official implicated "powerful American radars" in Alaska. Is there a...

From ACM News

Cyberwar Most Likely to Take Place Among Smaller Powers, Experts Say

Most Americans who worry about cyberwarfare are concerned that it will be directed against the United States. But the truth is that cyber conflict is far more...

From ACM News

Security and Surveillance Pervades Post-9/11 New York City

From building-blocking bollards to millimeter-wave scanners, the September 11 terrorist attacks have led to significant changes in security techniques and technology...

Car Computer Controls Could Be Vulnerable to Hackers
From ACM News

Car Computer Controls Could Be Vulnerable to Hackers

Researchers claim to wirelessly break into automobile networks to take control of brakes and steering as the automobile industry shores up defenses.

From ACM News

Being John Malkovich: Personal Control of Individual Brain Cells

In philosophy of mind, a "cerebroscope" is a fictitious device, a brain-computer interface in today's language, which reads out the content of somebody's brain...

From ACM News

How Can Online Advertising Companies Be Kept from Tracking Web Surfers?

The FTC is calling for "do not track" software, but one privacy and security expert said such programming would have to be incorporated into a browser for it...

Power Hackers: The U.s. Smart Grid Is Shaping Up to Be Dangerously Insecure
From ACM News

Power Hackers: The U.s. Smart Grid Is Shaping Up to Be Dangerously Insecure

Achieving greater efficiency and control of the electricity grid requires hooking almost every aspect of it up to the Internet, making it more vulnerable to cyber...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account