acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Apple and U.s. Bitterly Turn Up Volume in Iphone Privacy Fight
From ACM News

Apple and U.s. Bitterly Turn Up Volume in Iphone Privacy Fight

The Obama administration argued on Thursday that "no single corporation"—even one as successful as Apple—should be allowed to flout the rule of law by refusingF...

At Rsa Conference, Unlikely Allies Address Value of Digital Security
From ACM News

At Rsa Conference, Unlikely Allies Address Value of Digital Security

To Amit Yoran, a digital security veteran, the fight between Apple and the F.B.I. over access to an iPhone can be viewed in black-and-white terms: What law enforcement...

White House Officials Soften Approach at Rsa Conference
From ACM News

White House Officials Soften Approach at Rsa Conference

Attorney General Loretta E. Lynch joined a parade of Obama administration officials to tech's home turf on Tuesday. Their message: National security depends on...

Apple Is Said to Be Trying to Make It Harder to Hack Iphone
From ACM News

Apple Is Said to Be Trying to Make It Harder to Hack Iphone

Apple engineers have begun developing new security measures that would make it impossible for the government to break into a locked iPhone using methods similar...

Apple Sees Value in Its Stand to Protect Security
From ACM News

Apple Sees Value in Its Stand to Protect Security

It took six years for Apple to persuade China's largest wireless carrier, China Mobile, to sell the iPhone.

Tim Cook Opposes Order For Apple to ­nlock Iphone, Setting ­p Showdown
From ACM News

Tim Cook Opposes Order For Apple to ­nlock Iphone, Setting ­p Showdown

Apple said on Wednesday that it would oppose and challenge a federal court order to help the F.B.I. unlock an iPhone used by one of the two attackers who killed...

At Berkeley, a New Digital Privacy Protest
From ACM News

At Berkeley, a New Digital Privacy Protest

After hackers breached the computer network of the U.C.L.A. medical center last summer, Janet Napolitano, president of the University of California, and her office...

New Technologies Give Government Ample Means to Track Suspects, Study Finds
From ACM TechNews

New Technologies Give Government Ample Means to Track Suspects, Study Finds

U.S. intelligence agencies' persistent warning that encrypted communications will prevent them from tracking criminals is greatly distorted.

Europe's Top Digital-Privacy Watchdog Zeros In on ­.s. Tech Giants
From ACM News

Europe's Top Digital-Privacy Watchdog Zeros In on ­.s. Tech Giants

The latest standoff between Europe and American tech companies runs through a quiet street just north of the Louvre Museum, past chic cafes and part of the French...

For Now, Self-Driving Cars Still Need Humans
From ACM News

For Now, Self-Driving Cars Still Need Humans

Car enthusiasts, after hearing industry executives discussing the self-driving technology being built into their vehicles, might be forgiven for thinking robotic...

Can’t Put Down Your Device? That's By Design
From ACM News

Can’t Put Down Your Device? That's By Design

Greg Hochmuth was one of the first software engineers hired at Instagram.

Encrypted Messaging Apps Face New Scrutiny Over Possible Role in Paris Attacks
From ACM TechNews

Encrypted Messaging Apps Face New Scrutiny Over Possible Role in Paris Attacks

The Paris attacks have revived a debate between U.S. intelligence officials and Silicon Valley over opening a "back door" to decode encrypted data and conversations...

The Crispr Quandary
From ACM News

The Crispr Quandary

One day in March 2011, Emmanuelle Charpentier, a geneticist who was studying flesh-eating bacteria, approached Jennifer Doudna, an award-winning scientist, at a...

­.s. Tech Giants May Blur National Security Boundaries in China Deals
From ACM News

­.s. Tech Giants May Blur National Security Boundaries in China Deals

One Chinese technology company receives crucial technical guidance from a former People's Liberation Army rear admiral. Another company developed the electronics...

How Emojis Find Their Way to Phones
From ACM TechNews

How Emojis Find Their Way to Phones

The Unicode Consortium, founded in the late 1980s to create a standardized code for text characters, is attracting interest as the arbiter of new emojis. 

Obama Won't Seek Access to Encrypted User Data
From ACM TechNews

Obama Won't Seek Access to Encrypted User Data

The Obama administration will not compel U.S. technology companies to give law enforcement and intelligence agencies access to user data encrypted on digital devices...

Behind the European Privacy Ruling That's Confounding Silicon Valley
From ACM News

Behind the European Privacy Ruling That's Confounding Silicon Valley

On Tuesday, when Max Schrems won a landmark privacy case in the European Court of Justice, Edward Snowden told him on Twitter that he had "changed the world for...

Complex Car Software Becomes the Weak Spot ­nder the Hood
From ACM News

Complex Car Software Becomes the Weak Spot ­nder the Hood

Shwetak N. Patel looked over the 2013 Mercedes C300 and saw not a sporty all-wheel-drive sedan, but a bundle of technology.

­.s. and China Seek Arms Deal For Cyberspace
From ACM News

­.s. and China Seek Arms Deal For Cyberspace

The United States and China are negotiating what could become the first arms control accord for cyberspace, embracing a commitment by each country that it will...

China Tries to Extract Pledge of Compliance From ­.s. Tech Firms
From ACM News

China Tries to Extract Pledge of Compliance From ­.s. Tech Firms

The Chinese government, which has long used its country's vast market as leverage over American technology companies, is now asking some of those firms to directly...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account