acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Hidden World of Facebook "like Farms"
From ACM TechNews

The Hidden World of Facebook "like Farms"

A new study systematically investigated the nature of so-called Facebook "like farms," services which will direct Facebook Likes to a given Facebook page for a...

The Hidden World of Facebook 'like Farms'
From ACM News

The Hidden World of Facebook 'like Farms'

Facebook has become the advertising outlet of choice for many of the world’s businesses and companies.

Data Mining Reveals How Social Coding Succeeds (and Fails)
From ACM News

Data Mining Reveals How Social Coding Succeeds (and Fails)

The process of developing software has undergone huge transformation in the last decade or so.

Networked Home Gadgets Offer Hackers New Opportunities
From ACM TechNews

Networked Home Gadgets Offer Hackers New Opportunities

Connecting a new home appliance to a personal Wi-Fi network or broadband modem could increase the risk that data will be taken from other computers in the house...

A Chinese Internet Giant Starts to Dream
From ACM News

A Chinese Internet Giant Starts to Dream

Punk bands from Blondie to the Ramones once played in Broadway Studios, an age-worn 95-year-old neoclassical building surrounded by strip clubs in San Francisco’s...

Technology Can Make Lawful Surveillance Both Open and Effective
From ACM TechNews

Technology Can Make Lawful Surveillance Both Open and Effective

New technology could enable law enforcement to identify people whose actions justify  investigation and demonstrate probable cause via an authorized electronic...

Malware Traffic Spikes Preceded Russian and Israeli Conflicts
From ACM News

Malware Traffic Spikes Preceded Russian and Israeli Conflicts

A study of malware operating on corporate and government networks suggests that the communication patterns of these programs could warn of major conflicts.

The Growing Threat of Network-Based Steganography
From ACM TechNews

The Growing Threat of Network-Based Steganography

Researchers have uncovered Duqu, an unusual form of steganography-based malware that embeds itself in Microsoft Windows machines.

How Can a Civilian Plane Accidentally Be Shot Down?
From ACM News

How Can a Civilian Plane Accidentally Be Shot Down?

Pro-Russian separatists may have shot down Malaysia Airlines Flight 17 over eastern Ukraine on Thursday because they mistook the civilian plane for something else...

Can Software Make Health Data More Private?
From ACM TechNews

Can Software Make Health Data More Private?

New software could give people more control over how their personal health information is shared between doctors and medical institutions. 

Fake Followers for Hire, and How to Spot Them
From ACM TechNews

Fake Followers for Hire, and How to Spot Them

Researchers have developed machine-learning software that can identify crowdturfing, a term for falsifying one's popularity on social media sites. 

The Space-Based Quantum Cryptography Race
From ACM News

The Space-Based Quantum Cryptography Race

One of the great benefits of quantum communication is the ability to send messages from one point in space to another with perfect security.

How to Make Smart Watches Not Worth Stealing
From ACM TechNews

How to Make Smart Watches Not Worth Stealing

A prototype device can identify someone by measuring the electrical resistance of tissues within the person's wrist. 

Statistical Tricks Extract Sensitive Data From Encrypted Communications
From ACM TechNews

Statistical Tricks Extract Sensitive Data From Encrypted Communications

Private information can be obtained from encrypted communications using a technique known as traffic analysis to find patterns in the data stream. 

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage
From ACM Opinion

How the ­.s. Could Escalate Its Name-and-Shame Campaign Against China's Espionage

Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers...

Do We Need Asimov's Laws?
From ACM News

Do We Need Asimov's Laws?

In 1942, the science fiction author Isaac Asimov published a short story called Runaround in which he introduced three laws that governed the behaviour of robots...

World's First Covert Communications System With Camouflage Guaranteed
From ACM TechNews

World's First Covert Communications System With Camouflage Guaranteed

Researchers say they have developed a method to camouflage messages in a way that is mathematically guaranteed.

How Anybody Can Measure Your Computer's Wi-Fi Fingerprint
From ACM TechNews

How Anybody Can Measure Your Computer's Wi-Fi Fingerprint

Computer security experts have discovered a method of uniquely identifying a computer by the way it accesses Wi-Fi resources. 

Increasingly, Robots of All Sizes Are Human Workmates
From ACM News

Increasingly, Robots of All Sizes Are Human Workmates

Most industrial robots are far less friendly than the Roomba robot vacuum cleaner, which is safe enough to be a surprisingly popular means of feline transportation...

10 Breakthrough Technologies 2014
From ACM News

10 Breakthrough Technologies 2014

Technology news is full of incremental developments, but few of them are true milestones.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account