acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


What's Inside the Ipad's Chip?
From ACM News

What's Inside the Ipad's Chip?

Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad. Jobs described the...

From ACM News

Trading Shares in Milliseconds

Today's stock market has become a world of automated transactions executed at lightning speed. This high-frequency trading could make the financial system more...

Self-Policing Cloud Computing
From ACM TechNews

Self-Policing Cloud Computing

Researchers at IBM Thomas J. Watson Research Center and IBM Research-Zurich have developed a cloud computing security system that makes elements of the cloud act...

Web Security Tool Copies Apps' Moves
From ACM TechNews

Web Security Tool Copies Apps' Moves

Scientists at Microsoft research have unveiled Ripley, a new way to secure complex Web applications by effectively cloning the user's browser and running it remotely...

From ACM TechNews

Software That Fixes Itself

Massachusetts Institute of Technology researchers led by professor Martin Rinard have developed ClearView, software capable of finding and fixing certain types...

From ACM TechNews

Eavesdropping on Smartphone Secrets

Security researchers at Cryptography Research say the smart card attack involving differential power analysis could be used to target smartphones. Cryptography...

From ACM TechNews

Vulnerability Seen in Amazon's Cloud-Computing

A new study by researchers from the Massachusetts Institute of Technology (MIT) and the University of California, San Diego (UCSD) suggests that leading cloud-computing...

Wireless Network Modded to See Through Walls
From ACM News

Wireless Network Modded to See Through Walls

The way signal strength varies in a wireless network can reveal what's going on behind closed doors. It's every schoolboy's dream: an easy way of looking through...

Making Android More Secure
From ACM TechNews

Making Android More Secure

Google developed a new approach to mobile phone security with its open source Android operating system. Android developer Rich Cannings says there must be a balance...

From ACM TechNews

How to Build Anonymity Into the Internet

At the 9th annual Privacy Enhancing Technologies Symposium, security researchers discussed alternatives to existing systems designed to help Internet users maintain...

From ACM TechNews

Warning Issued on Web Programming Interfaces

Application programming interfaces (APIs), software specifications that allow Web sites and services to interact with each other, have been a major factor in the...

Hackers Game a Multiplayer World
From ACM TechNews

Hackers Game a Multiplayer World

Two programmers have hacked the World of Warcraft online game environment with a set of programs that automate in-game characters, which game developer Blizzard...

A Contest to Train Cyber Combatants
From ACM TechNews

A Contest to Train Cyber Combatants

A consortium that includes the Center for Strategic and International Studies, the SANS Institute, and the U.S. Department of Defense aims to cultivate a new generation...

Catching Spammers in the Act
From ACM TechNews

Catching Spammers in the Act

Indiana University researchers have exposed some of the methods spammers use to collect email addresses and send junk mail through multiple computers. In a paper...

Flaw Opens Atms to Hackers
From ACM TechNews

Flaw Opens Atms to Hackers

Juniper security researcher Barnaby Jack canceled plans for a live demonstration of the insecurity of automatic teller machines (ATMs) at the upcoming Black Hat...

Are Your 'secret Questions' Too Easily Answered?
From ACM TechNews

Are Your 'secret Questions' Too Easily Answered?

The "secret questions" that protect online accounts and passwords may be far less secure than commonly believed, largely because their answers are often far too...

A Blueprint to Stop Browser Attacks
From ACM TechNews

A Blueprint to Stop Browser Attacks

University of Illinois at Chicago (UIC) researchers will present a new way of defending against cross-site scripting attacks at the upcoming IEEE Symposium on Security...

From ACM TechNews

The Emerging Science of Dna Cryptography

The massively parallel nature of DNA computing represents a significant threat to existing encryption schemes, but the technology also could be used to encrypt...

From ACM TechNews

Stealthier Mac Attacks

A security expert at the recent Black Hat DC computer security conference demonstrated a technique for attacking the Mac operating system OS X without leaving any...

From ACM TechNews

A New Web of Trust

A year after security researchers exposed a flaw in the Domain Name System (DNS), a permanent solution is finally being implemented. The DNSSEC protocol, which...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account