acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe New York Times
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Twitter Wants to Reinvent Itself, by Merging the Old With the New
From ACM News

Twitter Wants to Reinvent Itself, by Merging the Old With the New

The company is undertaking a far-reaching effort to change how it works. For some, it is an echo of their early idealism and a vision for what the Internet could...

Millions for Crypto Start-Ups, No Real Names Necessary
From ACM News

Millions for Crypto Start-Ups, No Real Names Necessary

Investors give money to pseudonymous developers. Venture capitalists back founders without learning their real names. What happens when they need to know?

Here Comes the Full Amazonification of Whole Foods
From ACM News

Here Comes the Full Amazonification of Whole Foods

A newly revamped store in Washington shows how thoroughly Amazon has woven itself into the grocery shopping experience.

Russia Could Use Cryptocurrency to Blunt the Force of U.S. Sanctions
From ACM News

Russia Could Use Cryptocurrency to Blunt the Force of U.S. Sanctions

Russian companies have many cryptocurrency tools at their disposal to evade sanctions, including a so-called digital ruble and ransomware.

IRS Allows Taxpayers to Forgo Facial Recognition Amid Blowback
From ACM TechNews

IRS Allows Taxpayers to Forgo Facial Recognition Amid Blowback

The Internal Revenue Service has walked back a requirement for taxpayers to use facial recognition to access their online accounts.

Crypto Scammers’ New Target: Dating Apps
From ACM News

Crypto Scammers’ New Target: Dating Apps

"Everything was a lie," said one woman lured into a recent scam.

Apple Says It Will Make AirTags Easier to Find After Complaints of Stalking
From ACM News

Apple Says It Will Make AirTags Easier to Find After Complaints of Stalking

The $29 devices have become a headache for the company.

As Automakers Add Technology to Cars, Software Bugs Follow
From ACM News

As Automakers Add Technology to Cars, Software Bugs Follow

As automakers add technology to cars, software bugs follow.

I.R.S. to End Use of Facial Recognition for Identity Verification
From ACM News

I.R.S. to End Use of Facial Recognition for Identity Verification

After a bipartisan backlash, the agency will transition away from using a service from ID.me.

The New Spy Wars
From ACM News

The New Spy Wars

A tale about Israel, Pegasus, and the world.

U.S. Sends Top Security Official to Help NATO Brace for Russian Cyberattacks
From ACM News

U.S. Sends Top Security Official to Help NATO Brace for Russian Cyberattacks

Intelligence assessments suggest that a Russian invasion of Ukraine would most likely be preceded by cyberattacks on the country.

The Battle for the World's Most Powerful Cyberweapon
From ACM News

The Battle for the World's Most Powerful Cyberweapon

A Times investigation reveals how Israel reaped diplomatic gains from NSO's Pegasus spyware, a tool America itself purchased but is now trying to ban.

How Cookie Banners Backfired
From ACM News

How Cookie Banners Backfired

An extensive digital privacy law aimed to give internet users more control over their data. Instead, experts say, it's created "almost a useless exercise."

It's Hard to Tell When the Crypto Bubble Will Burst, or If There Is One
From ACM News

It's Hard to Tell When the Crypto Bubble Will Burst, or If There Is One

Crypto prices are highly volatile, but die-hard enthusiasts believe prices will keep soaring in a world where traditional notions of value don't apply.

How the Computer Chip Shortage Could Incite a U.S. Conflict With China
From ACM News

How the Computer Chip Shortage Could Incite a U.S. Conflict With China

A war game and study by a think tank illustrate how dependent the world is on Taiwan's semiconductor foundries.

Microsoft Warns of Destructive Cyberattack on Ukrainian Computer Networks
From ACM News

Microsoft Warns of Destructive Cyberattack on Ukrainian Computer Networks

The malware was revealed as Russian troops remained massed at the Ukrainian border, and after Ukrainian government agencies had their websites defaced.

Buying Influence: How China Manipulates Facebook and Twitter
From ACM News

Buying Influence: How China Manipulates Facebook and Twitter

Inside a Chinese propaganda campaign.

Are Apple AirTags Being Used to Track People, Steal Cars?
From ACM TechNews

Are Apple AirTags Being Used to Track People, Steal Cars?

Concerns are mounting as Apple's location-tracking AirTag devices are being found on people's cars and in their belongings, giving rise to fears of stalking.

Navigational Apps for the Blind Could Have a Broader Appeal
From ACM News

Navigational Apps for the Blind Could Have a Broader Appeal

A proliferation of new apps designed to help blind and low vision people could prove useful for everyone.

Banks Tiptoe Toward Their Cloud-Based Future
From ACM News

Banks Tiptoe Toward Their Cloud-Based Future

Cloud computing is slowly changing how Wall Street banks handle their business, but concerns with security remain.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account