acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTHE New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Fliers Must Turn Off Devices, but It's Not Clear Why

Millions of Americans who got on a plane over the Thanksgiving holiday heard the admonition: "Please power down your electronic devices for takeoff."

How Revolutionary Tools Cracked a 1700s Code
From ACM News

How Revolutionary Tools Cracked a 1700s Code

It has been more than six decades since Warren Weaver, a pioneer in automated language translation, suggested applying code-breaking techniques to the challenge...

From ACM News

New Malicious Program by Creators of Stuxnet Is Suspected

The designers of Stuxnet, the computer worm that was used to vandalize an Iranian nuclear site, may have struck again, security researchers say.

From ACM News

­.s. Debated Cyberwarfare in Attack Plan on Libya

Just before the American-led strikes against Libya in March, the Obama administration intensely debated whether to open the mission with a new kind of warfare...

From ACM News

Government Aims to Build a 'Data Eye in the Sky'

More than 60 years ago, in his "Foundation" series, the science fiction novelist Isaac Asimov invented a new science—psychohistory—that combined mathematics and...

From ACM News

Coming Soon: The Drone Arms Race

At the Zhuhai air show in southeastern China last November, Chinese companies startled some Americans by unveiling 25 different models of remotely controlled aircraft...

From ACM News

White House Orders New Computer Security Rules

The White House plans to issue an executive order on Friday to replace a flawed patchwork of computer security safeguards exposed by the disclosure of hundreds...

From ACM News

Setting Boundaries For Internet Privacy

Watchful European privacy regulators are wielding increasing influence beyond the Continent’s borders.

Call It Your Online Driver's License
From ACM TechNews

Call It Your Online Driver's License

The White House's National Strategy for Trusted Identities in Cyberspace encourages the private-sector creation and public adoption of online user authentication...

Bike Crash Wiped Details; Gps Data Filled Them In
From ACM News

Bike Crash Wiped Details; Gps Data Filled Them In

After racing and biking back roads on the San Francisco Peninsula for almost half a century without serious incident, on July 3 I crashed while riding downhill...

Hacker Rattles Security Circles
From ACM News

Hacker Rattles Security Circles

He claims to be 21 years old, a student of software engineering in Tehran who reveres Ayatollah Ali Khamenei, and despises dissidents in his country.

Sending the Police Before There's a Crime
From ACM News

Sending the Police Before There's a Crime

The arrests were routine. Two women were taken into custody after they were discovered peering into cars in a downtown parking garage in Santa Cruz, Calif. One...

Industry Tries to Streamline Privacy Policies For Mobile ­sers
From ACM TechNews

Industry Tries to Streamline Privacy Policies For Mobile ­sers

As concerns grow over data collection, including proposed legislation to more closely protect consumers, mobile applications developers are building basic privacy...

Mobilizing Help for People Accused of Hacking
From ACM News

Mobilizing Help for People Accused of Hacking

When Senator Joseph R. McCarthy held hearings in the 1950s to question witnesses about their supposed ties to communism, critics accused him of fomenting a Red...

From ACM News

At a Hacker Conference, Plenty of Friendly Feds

 Why are the Feds hobnobbing with hackers? Defcon, a convention of computer hackers here, was crawling with federal agents on Friday. They smiled, shook hands,...

From ACM News

Pentagon Seeks a Few Good Social Networkers

The Pentagon is developing plans to use social networking sites like Facebook and Twitter as both a resource and a weapon in future conflicts. Its research and...

Codebook Shows an Encryption Form Dates Back to Telegraphs
From ACM News

Codebook Shows an Encryption Form Dates Back to Telegraphs

If not for a computer scientist’s hobby of collecting old telegraph codebooks, a crucial chapter in modern cryptography might have been lost to history.

From ACM News

Decoding Your Email Personality

Imagine, if you will, a young Mark Zuckerberg circa 2003, tapping out mail messages from his Harvard dorm room. It's a safe bet he never would have guessed that...

Social Media History Becomes a New Job Hurdle
From ACM News

Social Media History Becomes a New Job Hurdle

Companies have long used criminal background checks, credit reports and even searches on Google and LinkedIn to probe the previous lives of prospective employees...

To Track Militants, U.s. Has System That Never Forgets a Face
From ACM News

To Track Militants, U.s. Has System That Never Forgets a Face

When the Taliban dug an elaborate tunnel system beneath the largest prison in southern Afghanistan this spring, they set off a scramble to catch the 475 inmates...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account