acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


From ACM TechNews

Giving Hackers a Printed Invitation

At the Shmoocon conference, researchers demonstrated how hackers are using printers to infiltrate corporate computer networks. Printers are "totally integrated...

Car Theft by Antenna
From ACM TechNews

Car Theft by Antenna

A method for breaking into and stealing cars that have keyless entry and starting systems has been found by ETH Zurich researchers, who were able to gain entry...

From ACM TechNews

'sms of Death' Could Crash Many Mobile Phones

Low-end mobile phones are vulnerable to hackers using short message service (SMS) communications, according to research presented at a recent conference in Germany...

The Brainy Learning Algorithms of Numenta
From ACM News

The Brainy Learning Algorithms of Numenta

How the inventor of the PalmPilot studied the workings of the human brain to help companies turn a deluge of data into business intelligence.

Raising a Botnet in Captivity
From ACM News

Raising a Botnet in Captivity

Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet.

Tracking Trick Shows the Web Where You Are
From ACM News

Tracking Trick Shows the Web Where You Are

A new technique from Microsoft Research Silicon Valley could be used to target advertising to users' surroundings without their knowledge.

Parc Readies Printed Electronics For Market
From ACM News

Parc Readies Printed Electronics For Market

Early 2011 will see printed memory devices in toys and printed sensors in packages used to ship drugs.

From ACM News

New Class of Malware Attacks Specific Chips

Computer scientists reveal malware that attacks specific processors rather than the operating system that runs on them.

Watch Where You're Going
From ACM News

Watch Where You're Going

Businesses are quietly buying mobile-phone data to discover the paths that consumers take.

Anticensorship Tool Proves Too Good to Be True
From ACM News

Anticensorship Tool Proves Too Good to Be True

Experts warn that the software could identify those it claims to protect.

Preventing Smart-Phone Armageddon
From ACM TechNews

Preventing Smart-Phone Armageddon

Attacks against smartphones are likely to proliferate because of their growing ubiquity and the sensitive information they carry. However, researchers believe...

Taking Over a Car
From ACM News

Taking Over a Car

Researchers "break in" with software and a laptop.

What Does 'p vs. Np' Mean For the Rest of Us?
From ACM News

What Does 'p vs. Np' Mean For the Rest of Us?

A proposed "proof" is probably a bust—but even failed attempts can advance computer science.

Mobile Flaw Could Cloak Clicks
From ACM TechNews

Mobile Flaw Could Cloak Clicks

Stanford University researchers have found that mobile websites are extremely vulnerable to attacks from malicious sites using a technique known as tapjacking,...

From ACM News

A Sidewalk Disappearing Act

Automatically removing people from street-level imagery could help prevent privacy complaints.

Wireless Car Sensors Vulnerable to Hackers
From ACM News

Wireless Car Sensors Vulnerable to Hackers

Hackers could "hijack" the wireless pressure sensors built into many cars' tires, researchers have found. Criminals might then track a vehicle or force its electronic...

Wikileaks Backlash Could Mean Less Data For Soldiers
From ACM News

Wikileaks Backlash Could Mean Less Data For Soldiers

Information shared with troops may be restricted.

Hacking the Smart Grid
From ACM News

Hacking the Smart Grid

The hurried deployment of smart-grid technology could leave critical infrastructure and private homes vulnerable to hackers. Security experts at the Black Hat...

From ACM News

The Hunt For the Wikileaks Whistle-Blower

Attorney General Eric Holder's new probe into Wikileaks's posting of 91,000 war documents will likely find that tracing the path of the documents back through the...

From ACM News

So Many Bugs, So Little Time

Tools that find serious bugs automatically could lead to safer, more stable software.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account