acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorThe Wall Street Journal
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Inside Google's Team Fighting to Keep Your Data Safe From Hackers
From ACM TechNews

Inside Google's Team Fighting to Keep Your Data Safe From Hackers

Google's Threat Analysis Group is an in-house counterespionage unit committed to keeping sensitive online information safe from hackers and spies.

Behind an Effort to Fact-Check Live News With Speed and Accuracy
From ACM TechNews

Behind an Effort to Fact-Check Live News With Speed and Accuracy

A new artificial intelligence-driven voice-scanning tool can identify dubious statements seconds after their utterance, in an effort to more accurately fact-check...

AI Could Make Cyberattacks More Dangerous, Harder to Detect
From ACM TechNews

AI Could Make Cyberattacks More Dangerous, Harder to Detect

Scientists warn that hackers could weaponize artificial intelligence to conceal and accelerate cyberattacks and potentially escalate their damage.

Voting Machine ­sed in Half of ­.S. Is Vulnerable to Attack, Report Finds
From ACM TechNews

Voting Machine ­sed in Half of ­.S. Is Vulnerable to Attack, Report Finds

Election machines used in more than half of U.S. states contain a decade-old flaw that makes them vulnerable to a cyberattack.

The 15 People Who Keep Wikipedia's Editors From Killing Each Other
From ACM News

The 15 People Who Keep Wikipedia's Editors From Killing Each Other

Wikipedia editors got locked in a dispute several months ago about the biographical summary boxes that sit atop some pages of the online encyclopedia. The tiff...

Who Has More of Your Personal Data Than Facebook? Try Google
From ACM Opinion

Who Has More of Your Personal Data Than Facebook? Try Google

Recent controversy over Facebook Inc.'s hunger for personal data has surfaced the notion that the online advertising industry could be hazardous to our privacy...

Next Worry for Facebook: Disenchanted ­sers
From ACM News

Next Worry for Facebook: Disenchanted ­sers

Facebook Inc.'s handling of user data has upset lawmakers and regulators in multiple countries. But the biggest risk to its business could come from angry users...

U.s. Should Invest More in Global Quantum Race, Researchers Tell Congressional Committee
From ACM TechNews

U.s. Should Invest More in Global Quantum Race, Researchers Tell Congressional Committee

Researchers told the U.S. House Science Committee that more federal funding is required to train specialists and advance real-world quantum computing applications...

Inside the Equifax Hack
From ACM TechNews

Inside the Equifax Hack

The Equifax breach, attributed to a server flaw disclosed by Cisco researchers that went unpatched, has potentially exposed an estimated 143 million Americans'...

Volunteers Archive Government Data, Worry Trump Administration Could Cut Access
From ACM TechNews

Volunteers Archive Government Data, Worry Trump Administration Could Cut Access

Volunteers are working to archive public databases hosted by U.S. government agencies because they are worried access to the data could be cut off by the Trump...

Iarpa to Develop Early-Warning System For Cyberattacks
From ACM TechNews

Iarpa to Develop Early-Warning System For Cyberattacks

The U.S. Intelligence Advanced Research Projects Activity has launched a multi-year initiative to create technologies that could provide early warning of cyberattacks...

Hackers Infect Army of Cameras, Dvrs For Massive Internet Attacks
From ACM News

Hackers Infect Army of Cameras, Dvrs For Massive Internet Attacks

Attackers used an army of hijacked security cameras and video recorders to launch several massive internet attacks last week, prompting fresh concern about the...

How to Stop Robocalls … or at Least Fight Back
From ACM Opinion

How to Stop Robocalls … or at Least Fight Back

"This is a final notice from the IRS."

Here's Your Chance to Decode President Lincoln's Secret Messages
From ACM Opinion

Here's Your Chance to Decode President Lincoln's Secret Messages

On April 12, 1865—three days after Gen. Robert E. Lee surrendered at Appomattox and two days before President Abraham Lincoln was assassinated—the president sent...

Bitcoin Technology's Next Big Test: Trillion-Dollar Repo Market
From ACM News

Bitcoin Technology's Next Big Test: Trillion-Dollar Repo Market

Depository Trust & Clearing Corp., a firm at the center of Wall Street’s trading infrastructure, is about to give the technology behind bitcoin a big test: seeing...

Chip Hacking Might Help Fbi ­nlock Iphones
From ACM News

Chip Hacking Might Help Fbi ­nlock Iphones

Even if the Justice Department loses its legal showdown with Apple Inc. over access to a killer's iPhone, the government might still be able to extract the data...

Apple Case Highlights Struggles Cios Face in Balancing Privacy, Law Enforcement Requests
From ACM Careers

Apple Case Highlights Struggles Cios Face in Balancing Privacy, Law Enforcement Requests

As technology advances, there's a delicate balance between individual privacy and law enforcement’s requests for information.

How the ­.s. Fights Encryption--and Also Helps Develop It
From ACM TechNews

How the ­.s. Fights Encryption--and Also Helps Develop It

Some U.S. government agencies are financing the development of encryption technologies to protect communications even as others seek to circumvent them. 

Silicon Valley Faces Showdown as Lawmakers Fume Over Encryption
From ACM News

Silicon Valley Faces Showdown as Lawmakers Fume Over Encryption

A number of lawmakers on Thursday expressed a growing frustration with technology companies and signaled Congress would consider either curbing encrypted communications...

In Belgium, an Encryption Powerhouse Rises
From ACM TechNews

In Belgium, an Encryption Powerhouse Rises

Belgium's University of Leuven has become a stage where privacy and surveillance advocates are fighting over digital encryption.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account