acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say
From ACM News

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed...

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks
From ACM News

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks

It began as a hobby for a ­teenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet.

­.s. Accelerating Cyberweapon Research
From ACM TechNews

­.s. Accelerating Cyberweapon Research

Former and current U.S. officials say the Pentagon is ramping up projects to develop next-generation cyberweapons that can disrupt enemy military networks even...

From ACM News

U.s. Accelerating Cyberweapon Research

The Pentagon is accelerating efforts to develop a new generation of cyberweapons capable of disrupting enemy military networks even when those networks are not...

Rise of the Drone: From Calif. Garage to Multibillion-Dollar Defense Industry
From ACM News

Rise of the Drone: From Calif. Garage to Multibillion-Dollar Defense Industry

In 1980, Abraham Karem, an engineer who had emigrated from Israel, retreated into his three-car garage in Hacienda Heights outside Los Angeles and, to the bemusement...

From ACM News

Sopa Hearings Cast Debate as Old Media vs. New Media

The circus atmosphere of the hearing on the Stop Online Piracy Act, introduced by Rep. Lamar Smith (R-Tex.), reflected the high-stakes, emotional nature of the...

From ACM News

Cyber-Intruder Sparks Massive Federal Response

The first sign of trouble was a mysterious signal emanating from deep within the U.S. military’s classified computer network.

Preventing a Pearl Harbor of Cyberspace
From ACM News

Preventing a Pearl Harbor of Cyberspace

At a time when the Internet has been inextricably linked to our national infrastructure, there are understandably serious concerns about the ability of the U.S...

From ACM News

How Many Security Clearances Have Been Issued?

More than 4.2 million people have security clearances for access to classified information, a number that vastly outstrips previous estimates and nearly rivals...

From ACM News

In China, Business Travelers Take Extreme Precautions to Avoid Cyber-Espionage

Packing for business in China? Bring your passport and business cards, but maybe not that laptop loaded with contacts and corporate memos.

From ACM News

Chinese Cyberwar Video Goes Missing

Now you see it, now you don’t. A Chinese documentary that showed off the military’s ability to conduct a cyberattack against a U.S.-based site appears to have...

Defcon Opens Its Doors to Pre-Teen and Teen Hackers
From ACM News

Defcon Opens Its Doors to Pre-Teen and Teen Hackers

DefCon, the conference where hackers and the people who monitor them get together to trade the latest in hacking and tracking data, had some new attendees: children...

From ACM News

­.s. Cyber Approach 'too Predictable' For One Top General

The nation’s second-ranking military official said Thursday that the U.S. approach to protecting its computer systems was "too predictable" and failed to penalize...

From ACM News

Maryland Sees Its Moment in Cybersecurity

As Fort Meade increasingly becomes a stronghold for federal cybersecurity, Maryland officials and business advocates are trying to take advantage of what they...

From ACM News

List of Cyber-Weapons Developed By Pentagon to Streamline Computer Warfare

The Pentagon has developed a list of cyber-weapons and -tools, including viruses that can sabotage an adversary’s critical networks, to streamline how the United...

From ACM News

Autocratic Regimes Fight Web-Savvy Opponents with Their Own Tools

For weeks, Syrian democracy activists have used Facebook and Twitter to promote a wave of bold demonstrations. Now, the Syrian government and its supporters are...

Obama Administration Outlines International Strategy For Cyberspace
From ACM TechNews

Obama Administration Outlines International Strategy For Cyberspace

President Obama has released an international strategy for cyberspace security that focuses on developing rules for responsible state behavior with the goal of...

From ACM News

Parting with Privacy with a Quick Click

When Scott Fitzsimones turned 13, he got an iPhone, set up accounts for Facebook and Pandora and went on an apps downloading spree. At the same time, the new...

From ACM News

CIA Recipe For Invisible Ink Among Newly Released Wwi-Era Documents

So you want to open sealed envelopes without getting caught? Here’s the secret, according to one of the six oldest classified documents in possession of the Central...

At&t, T-Mobile Merger Blasted
From ACM News

At&t, T-Mobile Merger Blasted

A day after AT&T announced it would buy T-Mobile USA to create the biggest wireless carrier in the country, consumer advocates and some members of Congress blasted...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account