acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


A Hunt For Ways to Combat Online Radicalization
From ACM Opinion

A Hunt For Ways to Combat Online Radicalization

Law enforcement officials, technology companies and lawmakers have long tried to limit what they call the "radicalization" of young people over the internet.

Cars Suck ­p Data About You. Where Does It All Go?
From ACM News

Cars Suck ­p Data About You. Where Does It All Go?

Cars have become rolling listening posts. They can track phone calls and texts, log queries to websites, record what radio stations you listen to—even tell you...

Deer Caught in the Headlights? Your Car May Soon See Them
From ACM TechNews

Deer Caught in the Headlights? Your Car May Soon See Them

Automakers are working to develop systems that would enable self-driving cars to avoid hitting large animals such as deer.

Hackers Find 'ideal Testing Ground' For Attacks: Developing Countries
From ACM News

Hackers Find 'ideal Testing Ground' For Attacks: Developing Countries

The attack had the hallmarks of something researchers had dreaded for years: malicious software using artificial intelligence that could lead to a new digital arms...

As Elites Switch to Texting, Watchdogs Fear Loss of Transparency
From ACM News

As Elites Switch to Texting, Watchdogs Fear Loss of Transparency

In a bygone analog era, lawmakers and corporate chiefs traveled great distances to swap secrets, to the smoke-filled back rooms of the World Economic Forum in Davos...

Envisioning the Car of the Future as a Living Room on Wheels
From ACM News

Envisioning the Car of the Future as a Living Room on Wheels

Swiveling seats? Movies projected across the windshield? Social media feeds on the windows?

­.s. Cyberweapons, ­sed Against Iran and North Korea, Are a Disappointment Against Isis
From ACM News

­.s. Cyberweapons, ­sed Against Iran and North Korea, Are a Disappointment Against Isis

America's fast-growing ranks of secret cyberwarriors have in recent years blown up nuclear centrifuges in Iran and turned to computer code and electronic warfare ...

Robot Cars Can't Count on ­S in an Emergency
From ACM TechNews

Robot Cars Can't Count on ­S in an Emergency

Many automotive technologists are skeptical that autonomous cars will be able to trust humans in emergency situations.

The Internet Is Where We Share, and Steal, the Best Ideas
From ACM News

The Internet Is Where We Share, and Steal, the Best Ideas

In April, a photograph of Rihanna and Lupita Nyong'o taken at a Miu Miu fashion show three years ago began recirculating online.

China, Addicted to Bootleg Software, Reels From Ransomware Attack
From ACM News

China, Addicted to Bootleg Software, Reels From Ransomware Attack

China is home to the world's largest group of internet users, a thriving online technology scene and rampant software piracy that encapsulates its determination...

Sent to Prison By a Software Program's Secret Algorithms
From ACM News

Sent to Prison By a Software Program's Secret Algorithms

When Chief Justice John G. Roberts Jr. visited Rensselaer Polytechnic Institute last month, he was asked a startling question, one with overtones of science fiction...

In Europe's Election Season, Tech Vies to Fight Fake News
From ACM TechNews

In Europe's Election Season, Tech Vies to Fight Fake News

Scientists are attempting to counter a rash of fake news spreading online as European elections loom.

That Fingerprint Sensor on Your Phone Is Not as Safe as You Think
From ACM News

That Fingerprint Sensor on Your Phone Is Not as Safe as You Think

Fingerprint sensors have turned modern smartphones into miracles of convenience.

Trump Completes Repeal of Online Privacy Protections From Obama Era
From ACM News

Trump Completes Repeal of Online Privacy Protections From Obama Era

President Trump on Monday signed a congressional resolution to complete the overturning of internet privacy protections created by the Federal Communications Commission...

It's Possible to Hack a Phone With Sound Waves, Researchers Show
From ACM News

It's Possible to Hack a Phone With Sound Waves, Researchers Show

A security loophole that would allow someone to add extra steps to the counter on your Fitbit monitor might seem harmless. But researchers say it points to the...

China's Intelligent Weaponry Gets Smarter
From ACM News

China's Intelligent Weaponry Gets Smarter

Robert O. Work, the veteran defense official retained as deputy secretary by President Trump, calls them his "A.I. dudes."

N.s.a. Gets More Latitude to Share Intercepted Communications
From ACM News

N.s.a. Gets More Latitude to Share Intercepted Communications

In its final days, the Obama administration has expanded the power of the National Security Agency to share globally intercepted personal communications with the...

Data Could Be the Next Tech Hot Button For Regulators
From ACM News

Data Could Be the Next Tech Hot Button For Regulators

Wealth and influence in the technology business have always been about gaining the upper hand in software or the machines that software ran on.

Cyberwar For Sale
From ACM News

Cyberwar For Sale

On the morning of May 18, 2014, Violeta Lagunes was perplexed by a series of strange messages that appeared in her Gmail inbox.

How Russia Recruited Elite Hackers For Its Cyberwar
From ACM News

How Russia Recruited Elite Hackers For Its Cyberwar

Aleksandr B. Vyarya thought his job was to defend people from cyberattacks until, he says, his government approached him with a request to do the opposite.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account