acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Shadow Brokers Mess Is What Happens When the Nsa Hoards Zero-Days
From ACM News

The Shadow Brokers Mess Is What Happens When the Nsa Hoards Zero-Days

When the NSA discovers a new method of hacking into a piece of software or hardware, it faces a dilemma.

Ironic Windows Vulnerability Shows Why Backdoors Can't Work
From ACM News

Ironic Windows Vulnerability Shows Why Backdoors Can't Work

Apple's refusal to comply with a court order to help the FBI crack an iPhone highlighted the pressure tech companies face to include backdoors in their software...

A New Wireless Hack Can Unlock 100 Million Volkswagens
From ACM News

A New Wireless Hack Can Unlock 100 Million Volkswagens

In 2013, when University of Birmingham computer scientist Flavio Garcia and a team of researchers were preparing to reveal a vulnerability that allowed them todelayed...

Hackers Hijack a Big Rig Truck's Accelerator and Brakes
From ACM News

Hackers Hijack a Big Rig Truck's Accelerator and Brakes

When cybersecurity researchers showed in recent years that they could hack a Chevy Impala or a Jeep Cherokee to disable the vehicles' brakes or hijack their steering...

America's Electronic Voting Machines Are Scarily Easy Targets
From ACM News

America's Electronic Voting Machines Are Scarily Easy Targets

This week, GOP presidential candidate Donald Trump openly speculated that this election would be "rigged." Last month, Russia decided to take an active role in...

How To Fool AI Into Seeing Something That Isn't There
From ACM News

How To Fool AI Into Seeing Something That Isn't There

Our machines are littered with security holes, because programmers are human.

Radio Hack Steals Keystrokes from Millions of Wireless Keyboards
From ACM News

Radio Hack Steals Keystrokes from Millions of Wireless Keyboards

You should be able to trust your wireless keyboard.

Snowden Designs a Device to Warn If Your Iphone's Radios Are Snitching
From ACM News

Snowden Designs a Device to Warn If Your Iphone's Radios Are Snitching

When Edward Snowden met with reporters in a Hong Kong hotel room to spill the NSA's secrets, he famously asked them put their phones in the fridge to block any...

Europe Is Going After Google Hard, and Google May Not Win
From ACM News

Europe Is Going After Google Hard, and Google May Not Win

Microsoft pulled the strings. At least, that’s what Google and so many business and tech journalists said when the search giant first faced antitrust complaints...

Clever Tool Shields Your Car From Hacks By Watching Its Internal Clocks
From ACM News

Clever Tool Shields Your Car From Hacks By Watching Its Internal Clocks

Car-hacking demonstrations tend to get all the glory in the security research community—remotely paralyzing a Jeep on the highway or cutting a Corvette’s brakes...

Artificial Intelligence Is Setting ­p the Internet For a Huge Clash With Europe
From ACM News

Artificial Intelligence Is Setting ­p the Internet For a Huge Clash With Europe

Neural networks are changing the Internet.

Google Tests New Crypto in Chrome to Fend Off Quantum Attacks
From ACM News

Google Tests New Crypto in Chrome to Fend Off Quantum Attacks

For anyone who cares about Internet security and encryption, the advent of practical quantum computing looms like the Y2K bug in the 1990s: a countdown to an unpredictable...

Clever Attack ­ses the Sound of a Computer's Fan to Steal Data
From ACM News

Clever Attack ­ses the Sound of a Computer's Fan to Steal Data

In the past two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that,...

Self-Driving Cars Will Teach Themselves to Save Lives—but Also Take Them
From ACM News

Self-Driving Cars Will Teach Themselves to Save Lives—but Also Take Them

If you follow the ongoing creation of self-driving cars, then you probably know about the classic thought experiment called the Trolley Problem.

Google's Training Its AI to Be Android's Security Guard
From ACM TechNews

Google's Training Its AI to Be Android's Security Guard

Google's Adrian Ludwig says computer security should manage risk so it can  learn to spot potential vulnerabilities on the fly using deep neural networks. 

This 'demonically Clever' Backdoor Hides In a Tiny Slice of a Computer Chip
From ACM News

This 'demonically Clever' Backdoor Hides In a Tiny Slice of a Computer Chip

Security flaws in software can be tough to find. Purposefully planted ones—hidden backdoors created by spies or saboteurs—are often even stealthier.

The White House Is Finally Prepping For an AI-Powered Future
From ACM TechNews

The White House Is Finally Prepping For an AI-Powered Future

The White House is adamant the government must determine how to regulate and utilize artificial intelligence technology before it gets out of control. 

Ibm's Watson Has a New Project: Fighting Cybercrime
From ACM News

Ibm's Watson Has a New Project: Fighting Cybercrime

IBM's Watson supercomputer hardly needs any more resumé-padding. It’s already wonJeopardy, written a cookbook, and dabbled in revolutionizing healthcare. 

Stingrays, the Spy Tool the Government Tried, and Failed, to Hide
From ACM News

Stingrays, the Spy Tool the Government Tried, and Failed, to Hide

Stingrays, a secretive law enforcement surveillance tool, are one of the most controversial technologies in the government’s spy kit.

The Critical Hole at the Heart of Our Cell Phone Networks
From ACM News

The Critical Hole at the Heart of Our Cell Phone Networks

In February 2014, the US ambassador to Ukraine suffered an embarrassing leak.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account