acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


More Than 30 States Offer Online Voting, but Experts Warn It Isn't Secure
From ACM TechNews

More Than 30 States Offer Online Voting, but Experts Warn It Isn't Secure

More than 30 states will be hosting online voting systems by the time of the U.S. presidential election in November, but experts warn such systems are still insecure...

­niversities Aren't Doing Enough to Train the Cyberdefenders America Desperately Needs
From ACM TechNews

­niversities Aren't Doing Enough to Train the Cyberdefenders America Desperately Needs

U.S. universities may not be doing enough to prepare the next generation of cyberdefenders, suggests the findings of a new analysis from CloudPassage.

The Tremendous Ambitions Behind New York City's Free Wifi
From ACM News

The Tremendous Ambitions Behind New York City's Free Wifi

At this very moment in New York City, you can walk up to one of 65 futuristic kiosks, punch in an email address on your phone and instantly receive a wireless Internet...

Fbi May Not Need Apple to ­nlock San Bernardino Shooter's Iphone
From ACM News

Fbi May Not Need Apple to ­nlock San Bernardino Shooter's Iphone

The FBI may have found a way without Apple’s assistance to unlock the iPhone used by one of the shooters in the San Bernardino terrorist attack, Justice Department...

Johns Hopkins Researchers Poke a Hole in Apple's Encryption
From ACM TechNews

Johns Hopkins Researchers Poke a Hole in Apple's Encryption

A research team from Johns Hopkins University has successfully cracked Apple's iMessage encryption. Professor Matthew D. Green says this disproves the notion that...

Why the Government Can't Actually Stop Terrorists From Using Encryption
From ACM TechNews

Why the Government Can't Actually Stop Terrorists From Using Encryption

Security experts say U.S. government efforts to force technology firms to grant access to encrypted devices will do little to prevent terrorists from using the...

The Massive New Privacy Deal Between U.s. and Europe, Explained
From ACM News

The Massive New Privacy Deal Between U.s. and Europe, Explained

U.S. and European regulators have agreed to a tentative deal, officials say, that would allow thousands of U.S. companies to continue moving the personal information...

The Big Data of Bad Driving, and How Insurers Plan to Track Your Every Turn
From ACM News

The Big Data of Bad Driving, and How Insurers Plan to Track Your Every Turn

For years, insurance companies have used estimates of your annual mileage to determine your car insurance rates.

The A.i. Anxiety
From ACM News

The A.i. Anxiety

The world’s spookiest philosopher is Nick Bostrom, a thin, soft-spoken Swede.

The Billion-Dollar Robot Question--How Can We Make Sure They're Safe?
From ACM TechNews

The Billion-Dollar Robot Question--How Can We Make Sure They're Safe?

The advent of unsupervised robots raises the question of how to ensure their safety. 

Tech Companies Are Slamming a Proposed ­k Terrorism Law. Here's Why.
From ACM News

Tech Companies Are Slamming a Proposed ­k Terrorism Law. Here's Why.

The world's biggest tech firms—including Apple, Microsoft, and Yahoo—are pressing for changes to a proposed British law aimed at expanding the government's electronic...

5 Amazing and Alarming Things That May Be Done with Your Dna
From ACM Opinion

5 Amazing and Alarming Things That May Be Done with Your Dna

"You're a male, you're 34-years-old and your 5-foot-10 1/2 inches tall." That's a prediction that Craig Venter, long a pioneer on the frontier of genomics, offered...

The Nsa School: How the Intelligence Community Gets Smarter, Secretly
From ACM Careers

The Nsa School: How the Intelligence Community Gets Smarter, Secretly

Leonard Reinsfelder's wife found a note on her car as she was leaving a shopping center one day: "Have your husband give us a call. We think we could use him."

Net of Insecurity: The Kernel of the Argument
From ACM TechNews

Net of Insecurity: The Kernel of the Argument

The Linux operating system has come to dominate the online world, but critics increasingly warn of security weaknesses that should have been corrected long ago. ...

Everything You Need to Know About the Vast ­ndersea Network that Makes the Internet Work
From ACM News

Everything You Need to Know About the Vast ­ndersea Network that Makes the Internet Work

Russians submarines and spy ships are "ggressively operating" near the undersea cables that are the backbone of the global Internet—worrying some U.S. intelligence...

How Human Nature Could Foil Tesla's New Autopilot
From ACM TechNews

How Human Nature Could Foil Tesla's New Autopilot

Researchers and driving safety experts warn the new autopilot option installed in most Tesla vehicles could cause unsafe conditions. 

With Court Order, Federal Judge Seeks to Fuel Debate About Data Encryption
From ACM News

With Court Order, Federal Judge Seeks to Fuel Debate About Data Encryption

A federal judge in New York is seeking to expand to the courts the hot debate over whether tech companies should be forced to find ways to unlock encrypted smartphones...

The Strange Link Between Global Climate Change and the Rise of the Robots
From ACM TechNews

The Strange Link Between Global Climate Change and the Rise of the Robots

A recent paper concluded humans would not stand a chance against super-intelligent robots following a hypothetical mass extinction event. 

­.S. Developing Sanctions Against China Over Cyberthefts
From ACM News

­.S. Developing Sanctions Against China Over Cyberthefts

The Obama administration is developing a package of unprecedented economic sanctions against Chinese companies and individuals who have benefited from their government's...

Could Hackers Take Down a City?
From ACM TechNews

Could Hackers Take Down a City?

Researchers warn of the possibility of cyberattackers crippling a city because of urban centers' increasing reliance on technology. 
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account