acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


How China Blocks the Tor Anonymity Network
From ACM News

How China Blocks the Tor Anonymity Network

The Tor Project is a free network run by volunteers that hides users locations and usage from surveillance and traffic analysis.

From ACM News

How a Web Link Can Take Control of Your Phone

A chilling demonstration to a small, packed room at the recent RSA security conference showed how clicking a single bad Web link while using a phone running Google's...

Eavesdropping Antennas Can Steal Your Smart Phone's Secrets
From ACM TechNews

Eavesdropping Antennas Can Steal Your Smart Phone's Secrets

Cryptography Research scientists have developed a method for a standard TV antenna, an amplifier, and specialized software to find the secret key being used by...

From ACM News

How a Web Link Can Take Control of Your Phone

A chilling demonstration to a small, packed room at the RSA security conference showed how clicking a single bad Web link while using a phone running Google's Android...

Defense Department Wants More Control Over the Internet
From ACM News

Defense Department Wants More Control Over the Internet

The U.S. Department of Defense may have funded the research that led to the Internet, but freewheeling innovation created the patchwork of privately owned technology...

Ultrafast Trades Trigger Black Swan Events Every Day, Say Econophysicists
From ACM News

Ultrafast Trades Trigger Black Swan Events Every Day, Say Econophysicists

On 6 May 2010, shares on U.S. financial markets suddenly dropped on average by around 10% but in over 300 stocks by more than 60%. Moments later the prices recovered...

From ACM News

Hacking Cars to Keep Them Safe

Tiffany Rad got interested in hacking cars because she wanted to drive her Land Rover off-road on rugged terrain without worrying about setting off the air bags...

From ACM News

Serious Flaw Emerges In Quantum Cryptography

The perfect secrecy offered by quantum mechanics appears to have been scuppered by a previously unknown practical problem, say physicists.

Encrypting Pictures Using Chaotic Cellular Automata
From ACM TechNews

Encrypting Pictures Using Chaotic Cellular Automata

Marina Jeaneth Machicao and colleagues at the University of San Paul in Brazil are using chaos to encrypt images. Their approach generates a pseudo-random signal...

From ACM News

Should We Fire the First Shot in a Cyberwar?

Military bureaucracies around the world are likely to see offensive capabilities as increasingly attractive in any cyberwar, suggests the head of the computer...

Seven Ways to Get Yourself Hacked
From ACM News

Seven Ways to Get Yourself Hacked

In recent months, I've met at least three people who have been the victim of hackers who've taken over their Gmail accounts and sent out emails to everyone in...

From ACM News

The Cyber Security Industrial Complex

Documents point to a huge industry that provides online surveillance tools to governments and police agencies.

From ACM News

Will the Kinect 2 Be Able to Read Your Lips?

How will users hack this one? The Kinect is a device that inherently grows and expands: Microsoft itself has come around to acknowledging that the oft-hackedreally...

Everything You Need to Know About Carrieriq
From ACM News

Everything You Need to Know About Carrieriq

"Carrier IQ" is a company that sells software to wireless companies that reports how well networks are performing in real-time, by sending performance data from...

Can Software Patch the Ailing Power Grid?
From ACM TechNews

Can Software Patch the Ailing Power Grid?

A consortium providing the technology for a large-scale smart grid project says the software is nearly complete. 

From ACM News

Transcending Borders but Not Laws

As cloud computing spreads data around the globe, a haze of legal and privacy questions follows.

The Next Wave of Botnets Could Descend from the Skies
From ACM News

The Next Wave of Botnets Could Descend from the Skies

The buzz starts low and quickly gets louder as a toy quadricopter flies in low over the buildings. It might look like flight enthusiasts having fun, but it could...

From ACM News

Csi: Tech to Automatically Identify the Bad Guy

Researchers hope a new system could automatically scan the hours of CCTV footage police have to comb through to identify suspects without invading privacy.

Personal Security
From ACM TechNews

Personal Security

Researchers have developed a laptop-sized device that emits a jamming signal whenever it detects an unauthorized wireless link being established between a medical...

A Cloud That Can't Leak
From ACM TechNews

A Cloud That Can't Leak

Microsoft researchers have developed a prototype data security system designed to ensure that information can only escape in an encrypted form that would be nearly...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account