acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Cracking the Crypto War
From ACM News

Cracking the Crypto War

Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: it satisfies both law enforcement and privacy purists.

How Google Is Cramming More Data Into Its New Atlantic Cable
From ACM News

How Google Is Cramming More Data Into Its New Atlantic Cable

Google says the fiber optic cable it's building across the Atlantic Ocean will be the fastest of its kind.

China Is Catching ­p to the ­S in A.I. Research, Fast
From ACM News

China Is Catching ­p to the ­S in A.I. Research, Fast

At the world's top computer-vision conference last June, Google and Apple sponsored an academic contest that challenged algorithms to make sense of images from...

NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source
From ACM TechNews

NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source

The U.S. National Security Agency has chosen to open source the cybersecurity tool Ghidra, a reverse-engineering platform that takes "compiled" software and "decompiles"...

Machine Learning Can ­se Tweets to Spot Critical Security Flaws
From ACM News

Machine Learning Can ­se Tweets to Spot Critical Security Flaws

At the endless booths of this week's RSA security trade show in San Francisco, an overflowing industry of vendors will offer any visitor an ad nauseam array of...

Quantum Physics Could Protect the Grid From Hackers, Maybe
From ACM News

Quantum Physics Could Protect the Grid From Hackers, Maybe

Cybersecurity experts have sounded the alarm for years: Hackers are ogling the U.S. power grid.

There's No Good Reason to Trust Blockchain Technology
From ACM News

There's No Good Reason to Trust Blockchain Technology

Opinion by Bruce Schneier, a security technologist who teaches at the Harvard Kennedy School.

The Elite Intel Team Still Fighting Meltdown and Spectre
From ACM News

The Elite Intel Team Still Fighting Meltdown and Spectre

Throughout 2018, researchers found exploitable weaknesses related to "speculative execution" vulnerabilities.

How Russian Trolls ­sed Meme Warfare to Divide America
From ACM News

How Russian Trolls ­sed Meme Warfare to Divide America

There's a meme on Instagram, circulated by a group called "Born Liberal." A fist holds a cluster of strings, reaching down into people with television sets for...

Here's How Much Bots Drive Conversation During News Events
From ACM News

Here's How Much Bots Drive Conversation During News Events

Last week, as thousands of Central American migrants made their way northward through Mexico, walking a treacherous route toward the US border, talk of "the caravan...

Google Wants China. Will Chinese ­sers Want Google?
From ACM News

Google Wants China. Will Chinese ­sers Want Google?

Google CEO Sundar Pichai was upbeat Monday when he told WIRED about internal tests of a censored search engine designed to win approval from Chinese officials....

These New Tricks Can Outsmart Deepfake Videos, for Now
From ACM News

These New Tricks Can Outsmart Deepfake Videos, for Now

For weeks, computer scientist Siwei Lyu had watched his team's deepfake videos with a gnawing sense of unease.

The Ick of AI That Impersonates Humans
From ACM News

The Ick of AI That Impersonates Humans

Philip K. Dick was living a few miles north of San Francisco when he wrote Do Androids Dream of Electric Sheep?, which envisioned a world where artificially intelligent...

How Russian Spies Infiltrated Hotel Wi-Fi to Hack Victims ­p Close
From ACM News

How Russian Spies Infiltrated Hotel Wi-Fi to Hack Victims ­p Close

For years, the Kremlin's increasingly aggressive hackers have reached across the globe to hit targets with everything from simple phishing schemes to worms built...

Mobile Websites Can Tap Into Your Phone's Sensors Without Asking
From ACM News

Mobile Websites Can Tap Into Your Phone's Sensors Without Asking

When apps want to access data from your smartphone's motion or light sensors, they often make that capability clear.

Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob
From ACM News

Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob

Tesla has taken plenty of innovative steps to protect the driving systems of its kitted-out cars against digital attacks. It's hired top-notch security engineers...

The Serious Security Problem Looming Over Robotics
From ACM News

The Serious Security Problem Looming Over Robotics

They call it Herb2. It's a dapper robot, wearing a bowtie even while it sits at home in its lab at the University of Washington.

A Monitor's ­ltrasonic Sounds Can Reveal What's on the Screen
From ACM News

A Monitor's ­ltrasonic Sounds Can Reveal What's on the Screen

You probably assume that someone can only see what's on your computer screen by looking at it.

How Hacked Water Heaters Could Trigger Mass Blackouts
From ACM News

How Hacked Water Heaters Could Trigger Mass Blackouts

When the cybersecurity industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of hackers ...

In Search of New Rules to Protect Other Worlds From Earth's Cooties
From ACM News

In Search of New Rules to Protect Other Worlds From Earth's Cooties

NASA has to start protecting planets better. The international treaty governing space—there is one—and the laws and regulations that follow it date back to the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account