acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTHE New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM News

Poker Bots Invade Online Gambling

Bryan Taylor, 36, could not shake the feeling that something funny was going on. Three of his most frequent opponents on an online poker site were acting oddly...

From ACM News

Researchers Show How a Car's Electronics Can Be Taken Over Remotely

With a modest amount of expertise, computer hackers could gain remote access to someone's car—just as they do to people's personal computers—and take over the...

New Hacking Tools Pose Bigger Threats to Wi-Fi ­sers
From ACM News

New Hacking Tools Pose Bigger Threats to Wi-Fi ­sers

You may think the only people capable of snooping on your Internet activity are government intelligence agents or possibly a talented teenage hacker holed up...

From ACM News

Wary of Egypt ­nrest, China Censors Web

In another era, China’s leaders might have been content to let discussion of the protests in Egypt float around among private citizens, then fizzle out.

Dealing With Assange and the Secrets He Spilled
From ACM News

Dealing With Assange and the Secrets He Spilled

This past June, Alan Rusbridger, the editor of The Guardian, phoned me and asked, mysteriously, whether I had any idea how to arrange a secure communication....

In New Military, Data Overload Can Be Deadly
From ACM News

In New Military, Data Overload Can Be Deadly

When military investigators looked into an attack by American helicopters last February that left 23 Afghan civilians dead, they found that the operator of a ...

Israel Tests on Worm Called Crucial in Iran Nuclear Delay
From ACM News

Israel Tests on Worm Called Crucial in Iran Nuclear Delay

The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel’s never-acknowledged nuclear arms program, where neat rows of factories...

From ACM News

The New Speed of Money, Reshaping Markets

A substantial part of all stock trading in the United States takes place in a warehouse in a nondescript business park just off the New Jersey Turnpike.

From ACM News

Computers That See You and Keep Watch Over You

Hundreds of correctional officers from prisons across America descended last spring on a shuttered penitentiary in West Virginia for annual training exercises...

When Innovation, Too, Is Made in China
From ACM News

When Innovation, Too, Is Made in China

As a national strategy, China is trying to build an economy that relies on innovation rather than imitation.

Cheaters Find an Adversary in Technology
From ACM News

Cheaters Find an Adversary in Technology

Mississippi had a problem born of the age of soaring student testing and digital technology. High school students taking the state’s end-of-year exams were using...

Gadgets Bring New Opportunities For Hackers
From ACM News

Gadgets Bring New Opportunities For Hackers

Researchers at Mocana, a security technology company in San Francisco, recently discovered they could hack into a best-selling Internet-ready HDTV model with...

From ACM News

U.s. Tries to Build Case For Conspiracy By Wikileaks

Federal prosecutors, seeking to build a case against the WikiLeaks leader Julian Assange for his role in a huge dissemination of classified government documents...

Panel Set to Study Safety of Electronic Patient Data
From ACM News

Panel Set to Study Safety of Electronic Patient Data

Almost two years ago, President Obama pledged $19 billion in stimulus incentives to help convert the nation’s doctors and hospitals to using a paperless system...

With Video Everywhere, Stark Evidence Is on Trial
From ACM News

With Video Everywhere, Stark Evidence Is on Trial

In a world that is always on camera, the centuries-old courtroom experience is becoming a lot more complicated.

From ACM News

Cyberattacks Are Retaliation for Pressure on WikiLeaks

A small army of activist hackers orchestrated a broad campaign of cyberattacks on Wednesday in support of the beleaguered antisecrecy organization WikiLeaks,...

Service Members Face New Threat: Identity Theft
From ACM News

Service Members Face New Threat: Identity Theft

The government warns Americans to closely guard their Social Security numbers. But it has done a poor job of protecting those same numbers for millions of people...

Cables Discuss Vast Hacking by a China That Fears the Web
From ACM News

Cables Discuss Vast Hacking by a China That Fears the Web

As China ratcheted up the pressure on Google to censor its Internet searches last year, the American Embassy sent a secret cable to Washington detailing why top...

From ACM News

WikiLeaks Struggles to Stay Online After Cyberattacks

An American provider of Internet domain names withdrew its service to the WikiLeaks Web site late Thursday after a barrage of attacks by hackers threatened to...

Privacy Groups Fault Online Health Sites For Sharing ­ser Data With Marketers
From ACM News

Privacy Groups Fault Online Health Sites For Sharing ­ser Data With Marketers

QualityHealth is a popular health Web site with more than 20 million registered users that offers online medical information and email newsletters on a variety...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account