acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorTechnology Review
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Rise of Voice Biometrics For Mobile Phones
From ACM TechNews

The Rise of Voice Biometrics For Mobile Phones

University of Colorado at Colorado Springs researchers have developed Vaulted Voice Verification, an approach to voice identification that can be used for voice...

How Google Plans to Find the ­ngoogleable
From ACM News

How Google Plans to Find the ­ngoogleable


How to Steal Data from Your Neighbor in the Cloud
From ACM News

How to Steal Data from Your Neighbor in the Cloud

Cloud computing teaches people not to worry about physical equipment for hosting data and running software.

Why You Can't Vote Online
From ACM TechNews

Why You Can't Vote Online

The lack of verifiable security in online voting systems due to unresolved fundamental problems is the main reason such systems are impractical, according to computer...

Why You Can't Vote Online Tuesday
From ACM News

Why You Can't Vote Online Tuesday

A decade and a half into the Web revolution, we do much of our banking and shopping online. So why can't we vote over the Internet? The answer is that voting presents...

The States with the Riskiest Voting Technology
From ACM News

The States with the Riskiest Voting Technology

Next Tuesday's presidential election will likely be extremely close, magnifying the potential impact of vote-counting errors.

Preparing For Cyber War, Without a Map
From ACM TechNews

Preparing For Cyber War, Without a Map

The U.S. government's retaliatory capability in response to cyberattacks on critical infrastructure is limited by a dearth of technology.  

Computer Viruses Are 'rampant' on Medical Devices in Hospitals
From ACM News

Computer Viruses Are 'rampant' on Medical Devices in Hospitals

Computerized hospital equipment is increasingly vulnerable to malware infections, according to participants in a recent government panel. These infections can clog...

Ever Wondered What a Live Botnet Looks Like?
From ACM News

Ever Wondered What a Live Botnet Looks Like?

The idea of a network of malware-infected zombie computers rigged to do the bidding of criminals conjures up a frightening image on its own. A new visualization...

To Keep Passwords Safe From Hackers, Just Break Them Into Bits
From ACM TechNews

To Keep Passwords Safe From Hackers, Just Break Them Into Bits

RSA researchers have developed a system that splits passwords in two and stores each half in different locations.  

Stuxnet Tricks Copied By Computer Criminals
From ACM TechNews

Stuxnet Tricks Copied By Computer Criminals

Security researchers warn that the techniques used in sophisticated, state-supported malware are being used by less-skilled programmers to target Web users.  

Stuxnet Tricks Copied By Computer Criminals
From ACM News

Stuxnet Tricks Copied By Computer Criminals

Malicious code apparently used by governments to spy on, harass, and sabotage one another has grabbed headlines in recent years, yet the highly targeted nature...

This Touch Screen Knows Your Touch
From ACM TechNews

This Touch Screen Knows Your Touch

Rutgers University researchers have developed a device that could identify an individual user and rapidly switch a system's settings to adjust to the user, providing...

From ACM News

Hey, Hackers: Defense Is Sexy, Too

Pleasing the crowd at the Black Hat and Def Con computer security conferences that took place in Las Vegas last week is relatively easy: simply hop on stage and...

A Computer Infection That Can Never Be Cured
From ACM TechNews

A Computer Infection That Can Never Be Cured

French hacker Jonathan Brossard recently developed Rakshasa, software that can be hidden inside the hardware of a PC, creating a backdoor that would allow secret...

Nsa Boss Wants More Control Over the 'net
From ACM News

Nsa Boss Wants More Control Over the 'net

The U.S. Internet's infrastructure needs to be redesigned to allow the NSA to know instantly when overseas hackers might be attacking public or private infrastructure...

From ACM News

Gps Weakness Could Enable Mass Smartphone Hacking

Weaknesses in the technology that allows smartphone users to pinpoint themselves on a map, or check into restaurants and bars using apps such as Foursquare, could...

The Latest Threat: A Virus Made Just For You
From ACM TechNews

The Latest Threat: A Virus Made Just For You

Georgia Tech's Paul Royal has shown that a newly refined technique could make automated analysis of malware nearly impossible, and he plans to reveal his work at...

What Facebook Knows
From ACM News

What Facebook Knows

If Facebook were a country, a conceit that founder Mark Zuckerberg has entertained in public, its 900 million members would make it the third largest in the world...

The Antivirus Era Is Over
From ACM News

The Antivirus Era Is Over

Two weeks ago today, computer security labs in Iran, Russia, and Hungary announced the discovery of Flame, "the most complex malware ever found," according to Hungary's...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account