acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


With Boxing Match, Video Piracy Battle Enters Latest Round: Mobile Apps
From ACM News

With Boxing Match, Video Piracy Battle Enters Latest Round: Mobile Apps

The method used by thousands of people to watch unauthorized broadcasts of Saturday night's big boxing match might have been new, but to longtime media executives...

Pentagon Announces New Strategy For Cyberwarfare
From ACM TechNews

Pentagon Announces New Strategy For Cyberwarfare

U.S. Department of Defense Secretary Ashton B. Carter has outlined the circumstances under which the U.S. could use cyberweapons against attackers. 

Smart City Technology May Be Vulnerable to Hackers
From ACM TechNews

Smart City Technology May Be Vulnerable to Hackers

Cesar Cerrudo, chief technology officer at IOActive Labs, says "smart city" technologies are vulnerable to cyberattacks. 

Online Test-Takers Feel Anti-Cheating Software's ­neasy Glare
From ACM Careers

Online Test-Takers Feel Anti-Cheating Software's ­neasy Glare

Before Betsy Chao, a senior here at Rutgers University, could take midterm exams in her online courses this semester, her instructors sent emails directing students...

Jay Edelson, the Class-Action Lawyer Who May Be Tech's Least Friended Man
From ACM Careers

Jay Edelson, the Class-Action Lawyer Who May Be Tech's Least Friended Man

When technology executives imagine the boogeyman, they see a baby-face guy in wire-rim glasses. His name is Jay Edelson.

Planes Without Pilots
From ACM TechNews

Planes Without Pilots

Modern airplanes are highly automated, but some researchers say there is room to automate planes even further.

Planes Without Pilots
From ACM News

Planes Without Pilots

Mounting evidence that the co-pilot crashed a Germanwings plane into a French mountain has prompted a global debate about how to better screen crewmembers for mental...

The Healing Power of Your Own Medical Records
From ACM News

The Healing Power of Your Own Medical Records

Steven Keating's doctors and medical experts view him as a citizen of the future.

­.s. Must Step ­p Capacity For Cyberattacks, Chief Argues
From ACM TechNews

­.s. Must Step ­p Capacity For Cyberattacks, Chief Argues

The director of the U.S. National Security Agency and the U.S. Cyber Command  advocated development of cyberweapons as a means of deterring cyberattacks.

A Police Gadget Tracks Phones? Shhh! It's Secret
From ACM News

A Police Gadget Tracks Phones? Shhh! It's Secret

A powerful new surveillance tool being adopted by police departments across the country comes with an unusual requirement: To buy it, law enforcement officials...

Pentagon Shops in Silicon Valley For Game Changers
From ACM Careers

Pentagon Shops in Silicon Valley For Game Changers

A small group of high-ranking Pentagon officials made a quiet visit to Silicon Valley in December to solicit national security ideas from start-up firms with little...

Building a Face, and a Case, on Dna
From ACM News

Building a Face, and a Case, on Dna

There were no known eyewitnesses to the murder of a young woman and her 3-year-old daughter four years ago. No security cameras caught a figure coming or going.

Document Reveals Growth of Cyberwarfare Between the ­.S. and Iran
From ACM News

Document Reveals Growth of Cyberwarfare Between the ­.S. and Iran

A newly disclosed National Security Agency document illustrates the striking acceleration of the use of cyberweapons by the United States and Iran against eachnuclear...

Obama Calls For New Cooperation to Wrangle the 'wild West' Internet
From ACM TechNews

Obama Calls For New Cooperation to Wrangle the 'wild West' Internet

President Barrack Obama has called on the private sector to take greater steps to share information about cybersecurity threats. 

Hoping Google's Lab Is a Rainmaker
From ACM Careers

Hoping Google's Lab Is a Rainmaker

Google's research arm, Google X, is called the company's Moonshot Factory. One reason the company picked the word "Moonshot" was to remind people to tackle big...

Hackers ­se Old Lure on Web to Help Syrian Government
From ACM TechNews

Hackers ­se Old Lure on Web to Help Syrian Government

Hackers working on behalf of the government of Syrian President Bashar al-Assad have been very successful in stealing crucial battlefield data from rebels.

New Rules in China ­pset Western Tech Companies
From ACM News

New Rules in China ­pset Western Tech Companies

The Chinese government has adopted new regulations requiring companies that sell computer equipment to Chinese banks to turn over secret source code, submit to...

China Further Tightens Grip on the Internet
From ACM TechNews

China Further Tightens Grip on the Internet

Chinese officials this week acted to block the functioning of several virtual private networks its citizens use to circumvent China's online censorship apparatus...

Ftc Says Internet-Connected Devices Pose Big Risks
From ACM TechNews

Ftc Says Internet-Connected Devices Pose Big Risks

Internet-connected devices present serious data security and privacy risks, according to a U.S. Federal Trade Commission report released this week.

Verizon's Mobile 'supercookies' Seen as Threat to Privacy
From ACM TechNews

Verizon's Mobile 'supercookies' Seen as Threat to Privacy

Long-standing concerns about the "supercookies" Verizon Wireless uses to tag its users for advertising purposes have resurfaced. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account