acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Google Glass Could Spur Wearable Tech Boom
From ACM TechNews

Google Glass Could Spur Wearable Tech Boom

IHS estimates that wearable-technology companies could sell up to 9.4 million devices by 2016. 

Little-Known Surveillance Tool Raises Concerns By Judges, Privacy Activists
From ACM News

Little-Known Surveillance Tool Raises Concerns By Judges, Privacy Activists

Federal investigators in Northern California routinely used a sophisticated surveillance system to scoop up data from cellphones and other wireless devices in an...

U.s. Cybersecurity Policy Draws Interest from Companies, Lobbyists
From ACM News

U.s. Cybersecurity Policy Draws Interest from Companies, Lobbyists

The determination by Congress and President Obama to protect networks of critical U.S. industries from hackers and cyberspies is creating an explosive growth opportunity—for...

Pentagon Creating Teams to Launch Cyberattacks as Threat Grows
From ACM News

Pentagon Creating Teams to Launch Cyberattacks as Threat Grows

The Pentagon's Cyber Command will create 13 offensive teams by the fall of 2015 to help defend the nation against major computer attacks from abroad, Gen. Keith...

Web-Connected Cars Bring Privacy Concerns
From ACM News

Web-Connected Cars Bring Privacy Concerns

Cars will soon be so linked into wireless networks they will be like giant rolling smartphones—with calling systems, streaming video, cameras, and apps ­capable...

Pentagon to Boost Cybersecurity Force
From ACM TechNews

Pentagon to Boost Cybersecurity Force

The Pentagon has approved plans to expand its cybersecurity force more than fivefold to protect the U.S.'s critical computer systems and conduct offensive computer...

Banks Seek Nsa Help Amid Attacks on Their Computer Systems
From ACM News

Banks Seek Nsa Help Amid Attacks on Their Computer Systems

Major U.S. banks have turned to the National Security Agency for help protecting their computer systems after a barrage of assaults that have disrupted their Web...

To Thwart Hackers, Firms Salting Their Servers With Fake Data
From ACM TechNews

To Thwart Hackers, Firms Salting Their Servers With Fake Data

Some companies are increasingly making use of controversial cybersecurity tactics involving the use of fake data on servers and Web sites meant to ensnare hackers...

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive
From ACM News

Cybersleuths Try to Mine Newtown Killer Adam Lanza's Hard Drive

Some of the most important clues about what drove Adam Lanza to mass murder probably sit on the computer that the reclusive, technical-minded 20-year-old used as...

Hacker Locates John Mcafee Through Smartphone Tracks
From ACM News

Hacker Locates John Mcafee Through Smartphone Tracks

Weeks of international intrigue about the whereabouts of tech millionaire John McAfee ended Tuesday after the Internet pioneer made an elementary digital mistake...

Cybercity Allows Government Hackers to Train For Attacks
From ACM TechNews

Cybercity Allows Government Hackers to Train For Attacks

The Pentagon is building a virtual city that will enable government hackers to practice attacking and defending the computers and networks that increasingly run...

Web Monitor: 100 Percent of Syria's Internet Just Shut Down
From ACM News

Web Monitor: 100 Percent of Syria's Internet Just Shut Down

It appears that the Syrian government may have just taken a drastic measure it has conspicuously avoided over the nearly two years of fighting: cutting itself off...

In Fairfax County, the Classroom Is a (cyber) Battlefield
From ACM TechNews

In Fairfax County, the Classroom Is a (cyber) Battlefield

Thousands of students across the U.S. recently participated in the opening round of the CyberPatriot challenge, the premier high school cyberwarfare competition...

From ACM News

When Is a Cyberattack an Act of War?

On the night of Oct. 11, Defense Secretary Leon Panetta stood inside the Intrepid Sea, Air and Space Museum, housed in a former aircraft carrier moored at a New...

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems
From ACM News

In Cyberattacks, Hacking Humans Is Highly Effective Way to Access Systems

The emails arrived like poison darts from cyberspace.

Secrecy Surrounding 'zero-Day Exploits' Industry Spurs Calls For Government Oversight
From ACM TechNews

Secrecy Surrounding 'zero-Day Exploits' Industry Spurs Calls For Government Oversight

A barely regulated industry for zero-day exploits sold by researchers has sprung up, and even certain insiders believe trade of these hacker or security tools...

Gps Technology Finding Its Way Into Court
From ACM News

Gps Technology Finding Its Way Into Court

The rapid spread of cellphones with GPS technology has allowed police to track suspects with unprecedented precision—even as they commit crimes. But the legal fight...

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks
From ACM News

Tridium's Niagara Framework: Marvel of Connectivity Illustrates New Cyber Risks

John Sublett and his colleagues had an audacious, digital-age plan. They wanted to use the Internet to enable businesses to manage any kind of electronic device...

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say
From ACM News

­.S., Israel Developed Flame Computer Virus to Slow Iranian Nuclear Efforts, Officials Say

The United States and Israel jointly developed a sophisticated computer virus nicknamed Flame that collected intelligence in preparation for cyber-sabotage aimed...

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks
From ACM News

Cyber Search Engine Shodan Exposes Industrial Control Systems to New Risks

It began as a hobby for a ­teenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account