acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


For E-Data, Tug Grows Over Privacy vs. Security
From ACM News

For E-Data, Tug Grows Over Privacy vs. Security

 The threat by the United Arab Emirates to shut down mobile services on BlackBerrys like email and text messaging underscores a growing tension between communications...

From ACM News

Hackers With Enigmatic Motives Vex Companies

The world of hackers can be roughly divided into three groups. "Black hats" break into corporate computer systems for fun and profit, taking credit card numbers...

The Web Means the End of Forgetting
From ACM News

The Web Means the End of Forgetting

Four years ago, Stacy Snyder, then a 25-year-old teacher in training at Conestoga Valley High School in Lancaster, Pa., posted a photo on her MySpace page that...

Loophole May Have Aided Theft of Classified Data
From ACM News

Loophole May Have Aided Theft of Classified Data

The soldier accused of downloading a huge trove of secret data from military computers in Iraq appears to have exploited a loophole in Defense Department security...

Taking the Mystery Out of Web Anonymity
From ACM News

Taking the Mystery Out of Web Anonymity

The Obama Administration is trying to fix the Internet’s dog problem.

To Stop Cheats, Colleges Learn Their Trickery
From ACM News

To Stop Cheats, Colleges Learn Their Trickery

The frontier in the battle to defeat student cheating may be here at the testing center of the University of Central Florida.

From ACM News

Cars' Computer Systems Called at Risk to Hackers

Automobiles, which will be increasingly connected to the Internet in the near future, could be vulnerable to hackers just as computers are now, two teams of computer...

Four Nerds and a Cry to Arms Against Facebook
From ACM News

Four Nerds and a Cry to Arms Against Facebook

How angry is the world at Facebook for devouring every morsel of personal information we are willing to feed it?

Shoppers Who Can
From ACM News

Shoppers Who Can

It’s called behavioral tracking: Cameras that can follow you from the minute you enter a store to the moment you hit the checkout counter, recording every T-shirt...

Cash, Check or Charge? How About Cellphone?
From ACM News

Cash, Check or Charge? How About Cellphone?

You win a bet, but the loser does not have enough cash on him to settle it. If he has a credit card, and most people usually do, there is finally a solution. AeBay...

Spammers Pay Others to Answer Security Tests
From ACM News

Spammers Pay Others to Answer Security Tests

Faced with stricter Internet security measures, some spammers have begun borrowing a page from corporate America’s playbook: they are outsourcing. The going rate...

From ACM News

Apple Removes Teaching App From App Store, and Educators Complain

Apple generally makes news by publishing new apps, not by unpublishing them. But last week, it made some educators upset when it removed an app, Scratch Viewer,...

Cyberattack on Google Said to Hit Password System
From ACM News

Cyberattack on Google Said to Hit Password System

New details have been disclosed about information stolen in the attacks on Google's computers announced in January. The losses included a password system that...

From ACM News

Web Coupons Know Lots About You, and They Tell

For decades, shoppers have taken advantage of coupons. Now, the coupons are taking advantage of the shoppers. A new breed of coupon, printed from the Internet or...

Companies Slowly Join Cloud-Computing
From ACM News

Companies Slowly Join Cloud-Computing

This year, Netflix made what looked like a peculiar choice: the DVD-by-mail company decided that over the next two years, it would move most of its Web technology...

From ACM TechNews

At Internet Conference, Signs of Agreement Between U.s. and Russia

Security specialists from eight countries met at a Russian-sponsored conference on Internet security to discuss their differences on how governments view cyberspace...

Researchers Trace Data Theft to Intruders in China
From ACM News

Researchers Trace Data Theft to Intruders in China

Canadian and United States computer security researchers have monitored the spying operation of a China-based computer espionage gang for the past eight months...

Academic Paper in China Sets Off Alarms in ­.s.
From ACM News

Academic Paper in China Sets Off Alarms in ­.s.

Wang Jianwei, a graduate engineering student in Liaoning, China, who was described as a potential cyberwarrior before the United States Congress this month, says...

How Privacy Vanishes Online
From ACM News

How Privacy Vanishes Online

If a stranger came up to you on the street, would you give him your name, Social Security number and e-mail address? Yet people often dole out all kinds of personal...

Instant Ads Set the Pace on the Web
From ACM News

Instant Ads Set the Pace on the Web

 Advertisers have been able to direct online messages based on demographics, income and even location, but one element has been largely missing until recently:...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account