acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future
From ACM News

Beyond Cell Phone Wallets, Biometrics Promise Truly Wallet-Free Future

Ever since Google announced that its Android phones would be equipped with a "digital wallet" that allows users to pay for things simply by touching their phone...

Forget Passwords and Let the Browser Remember
From ACM TechNews

Forget Passwords and Let the Browser Remember

The Mozilla Foundation recently released BrowserID, an experimental tool designed to change the way users identify themselves online by storing identity information...

A Futures Market For Computer Security
From ACM TechNews

A Futures Market For Computer Security

A pilot prediction market that can forecast major information security incidents before they occur is under development by information security researchers from...

From ACM News

Bug-Squashing Tools Offered to Improve Network Security

The Department of Homeland Security has announced an initiative to shore up security by squashing software bugs. This follows a slew of high-profile attacks on...

Software Extracts Your Location on Twitter Even When It's Secret
From ACM TechNews

Software Extracts Your Location on Twitter Even When It's Secret

Users of online social media reveal more about themselves than they realize, and participation involves a great deal more trust than they think, suggests new research...

Most Malware Tied to 'pay-Per-Install' Market
From ACM TechNews

Most Malware Tied to 'pay-Per-Install' Market

Researchers have found that most personal computers that get infected with malware were targeted by pay-per-install services, which charge hacking gangs up to $180...

Making the Case For Security
From ACM News

Making the Case For Security

Major corporations have made serious mistakes with information security recently, resulting in spectacular failures to protect business and customer records....

What Bitcoin Is, and Why It Matters
From ACM News

What Bitcoin Is, and Why It Matters

Recent weeks have been exciting for a relatively new kind of currency speculator. In just three weeks, the total value of a unique new digital currency called...

Tracking How Mobile Apps Track You
From ACM News

Tracking How Mobile Apps Track You

Third-party apps are the weakest link in user privacy on smart phones. They often get access to large quantities of user data, and there are few rules covering...

The Next Big Thing in Analytics: Tracking Your Cursor's Every Move
From ACM News

The Next Big Thing in Analytics: Tracking Your Cursor's Every Move

Media, search engines, advertisers and social networks have been tracking what you click since the birth of the Web, but this measurement yields an incomplete...

Failure Cascading Through the Cloud
From ACM News

Failure Cascading Through the Cloud

Two major cloud computing services, Amazon's Elastic Compute Cloud and Sony's PlayStation Network, recently suffered extended outages. Though the circumstances...

App-Specific Processors to Fight Dark Silicon
From ACM TechNews

App-Specific Processors to Fight Dark Silicon

University of California, San Diego researchers working on the GreenDroid project have developed software that scans the Android operating system and its most popular...

How People Broadcast Their Locations Without Meaning To
From ACM News

How People Broadcast Their Locations Without Meaning To

Smartphones include geotagging features many people aren't aware of.

Microsoft Browser Would Offer Personalization Along With Privacy Protection
From ACM TechNews

Microsoft Browser Would Offer Personalization Along With Privacy Protection

Microsoft researchers have developed RePriv, a browser that analyzes users' online behavior and controls how their personal information is released to sites that...

From ACM News

The Botnets That Won't Die

New communications schemes could make zombie PC networks far more difficult to shut down.

Busting the Botnets
From ACM News

Busting the Botnets

They're the scourge of the Internet—networks containing thousands or even millions of virus-infected, remote-controlled PCs. These so-called "botnets" send out...

From ACM News

Social Search, Without a Social Network

Google may be built on an algorithm for taming the Web, but yesterday the company added social features that will let your friends help determine what ranks high...

How Cruise Missiles Would Beat Gps Jammers in Libya
From ACM News

How Cruise Missiles Would Beat Gps Jammers in Libya

Now that jammers are cheap and potentially ubiquitous, how do Tomahawk missiles stay on course?

Taking Control of Cars From Afar
From ACM News

Taking Control of Cars From Afar

Researchers who have spent the last two years studying the security of car computer systems have revealed that they can take control of vehicles wirelessly.

Spotting Virtual Intruders
From ACM News

Spotting Virtual Intruders

Handing sensitive data over to a cloud computing provider makes many companies skittish. But new software, called HomeAlone, could help them come to terms with...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account