acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectPersonal Computing
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Snowden Designs a Device to Warn If Your Iphone's Radios Are Snitching
From ACM News

Snowden Designs a Device to Warn If Your Iphone's Radios Are Snitching

When Edward Snowden met with reporters in a Hong Kong hotel room to spill the NSA's secrets, he famously asked them put their phones in the fridge to block any...

Europe Is Going After Google Hard, and Google May Not Win
From ACM News

Europe Is Going After Google Hard, and Google May Not Win

Microsoft pulled the strings. At least, that’s what Google and so many business and tech journalists said when the search giant first faced antitrust complaints...

Artificial Intelligence Is Setting ­p the Internet For a Huge Clash With Europe
From ACM News

Artificial Intelligence Is Setting ­p the Internet For a Huge Clash With Europe

Neural networks are changing the Internet.

Google Tests New Crypto in Chrome to Fend Off Quantum Attacks
From ACM News

Google Tests New Crypto in Chrome to Fend Off Quantum Attacks

For anyone who cares about Internet security and encryption, the advent of practical quantum computing looms like the Y2K bug in the 1990s: a countdown to an unpredictable...

Clever Attack ­ses the Sound of a Computer's Fan to Steal Data
From ACM News

Clever Attack ­ses the Sound of a Computer's Fan to Steal Data

In the past two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that,...

Stingrays, the Spy Tool the Government Tried, and Failed, to Hide
From ACM News

Stingrays, the Spy Tool the Government Tried, and Failed, to Hide

Stingrays, a secretive law enforcement surveillance tool, are one of the most controversial technologies in the government’s spy kit.

The Critical Hole at the Heart of Our Cell Phone Networks
From ACM News

The Critical Hole at the Heart of Our Cell Phone Networks

In February 2014, the US ambassador to Ukraine suffered an embarrassing leak.

The Average Webpage Is Now the Size of the Original Doom
From ACM News

The Average Webpage Is Now the Size of the Original Doom

The web is Doomed.

Two Tips to Keep Your Phone's Encrypted Messages Encrypted
From ACM News

Two Tips to Keep Your Phone's Encrypted Messages Encrypted

End-to-end encryption by default is quickly becoming the new standard for any communications app that claims to care about the privacy of those who use it.

Hyper Vision
From ACM News

Hyper Vision

There is something special happening in a generic office park in an uninspiring suburb near Fort Lauderdale, Florida.

A Scheme to Encrypt the Entire Web Is Actually Working
From ACM News

A Scheme to Encrypt the Entire Web Is Actually Working

Apple's move to encrypt your iPhone and WhatsApp's rollout of end-to-end encrypted messaging have generated plenty of privacy applause and law enforcement controversy...

Forget Apple vs. the Fbi: Whatsapp Just Switched on Encryption For a Billion People
From ACM News

Forget Apple vs. the Fbi: Whatsapp Just Switched on Encryption For a Billion People

For most of the past six weeks, the biggest story out of Silicon Valley was Apple's battle with the FBI over a federal order to unlock the iPhone of a mass shooter...

Why Do the Feds ­sually Try to ­nlock Phones? It's Drugs, Not Terrorism
From ACM News

Why Do the Feds ­sually Try to ­nlock Phones? It's Drugs, Not Terrorism

Until the FBI backed down from its battle with Apple over accessing the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, it seemed the agency had chosen...

Why Isis Is Winning the Social Media War
From ACM News

Why Isis Is Winning the Social Media War

Early last December, two days after Syed Farook and Tashfeen Malik murdered 14 people at a holiday party in San Bernardino, California, the married couple’s landlord...

Long Before the Apple-Fbi Battle, Lavabit Sounded a Warning
From ACM News

Long Before the Apple-Fbi Battle, Lavabit Sounded a Warning

Three years ago, Ladar Levison, the founder of the now-defunct secure email service known as Lavabit, was in the same position Apple finds itself today: facing...

Biometrics Are Coming, Along With Serious Security Concerns
From ACM News

Biometrics Are Coming, Along With Serious Security Concerns

You're buying a pair of jeans. At the register, instead of reaching for your wallet or phone, you pull back your hair.

How the Feds Could Get Into Iphones Without Apple's Help
From ACM News

How the Feds Could Get Into Iphones Without Apple's Help

It's a showdown that has the country mesmerized.

Apple's Fbi Battle Is Complicated. Here's What's Really Going On
From ACM News

Apple's Fbi Battle Is Complicated. Here's What's Really Going On

The news this week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and...

If You Go Near the Super Bowl, You Will Be Surveilled Hard
From ACM News

If You Go Near the Super Bowl, You Will Be Surveilled Hard

Super Bowl 50 will be big in every way.

Nsa Hacker Chief Explains How to Keep Him Out of Your System
From ACM News

Nsa Hacker Chief Explains How to Keep Him Out of Your System

It was the talk most anticipated at this year's inaugural Usenix Enigma security conference in San Francisco and one that even the other speakers were eager to...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account