acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Nsa Encryption Backdoor Proof of Concept Published
From ACM TechNews

Nsa Encryption Backdoor Proof of Concept Published

A security freelancer  has published a proof-of-concept code for exploiting a security flaw in the Dual Elliptic Curve Deterministic Random Bit Generator. 

Researchers ­se Shopping Cart to Put Mobile, Nfc Payment Theft on Wheels
From ACM TechNews

Researchers ­se Shopping Cart to Put Mobile, Nfc Payment Theft on Wheels

Researchers have found that contactless payments are more vulnerable then previously believed.

Microsoft ­nleashes Bug Bounty Program--for Betas, Too
From ACM TechNews

Microsoft ­nleashes Bug Bounty Program--for Betas, Too

Microsoft has announced plans to launch three bug bounty programs designed to eliminate security vulnerabilities in its software. 

Israel Launches Cyber Warfare Training Program
From ACM TechNews

Israel Launches Cyber Warfare Training Program

Israel is recruiting top students for a new cyberwarfare training program. The program shows how Israel is advancing in the field of cybernetics to develop "high...

Osama Bin Laden Didn't Use Encryption: 17 Documents Released
From ACM News

Osama Bin Laden Didn't Use Encryption: 17 Documents Released

It appears that Osama bin Laden didn’t encrypt any of his computer files. If he had, U.S. authorities probably wouldn’t have been able to do much after confiscating...

From ACM News

Inside Stuxnet: Researcher Drops New Clues About Origin of Worm

The mysterious Stuxnet worm took center stage at the Virus Bulletin 2010 conference here with a prominent security researcher dropping a raw hint that Israel may...

ITU Head: Cyberwar Could Be 'Worse Than Tsunami'
From ACM TechNews

ITU Head: Cyberwar Could Be 'Worse Than Tsunami'

There needs to be a global cybersecurity peace treaty to avert the threat of international cyberwar, whose effects would be more devastating than a tsunami, says...

Security Key to Unlocking Cloud Potential
From ACM News

Security Key to Unlocking Cloud Potential

The issue of security is holding back its full potential of cloud computing. This was the gist of the keynote message presented Tuesday (March 2) by Art Coviello...

From ACM TechNews

Software Liability Law Could Divide Open Source

The European Commission has proposed that software companies should be held liable for the security and efficiency of their products. Ovum's David Mitchell says...

Chink in Encryption Armor Discovered
From ACM TechNews

Chink in Encryption Armor Discovered

Researchers from the Information Security Group (ISG) at Royal Holloway, University of London have discovered an underlying flaw in the OpenSSH encryption protocol...

From ACM News

Crypto Pioneers Differ on Cloud-Computing Risks

A group of pioneers in the security field, whose work in encryption is used to protect Internet data and communications every day, spoke recently about the state...

From ACM TechNews

Berners-Lee: Semantic Web Will Have Privacy Built-In

World Wide Web Consortium director Sir Tim Berners-Lee says the Semantic Web will improve online privacy protection by allowing Internet users to control who can...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account