acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Ethics of Hacking 101
From ACM TechNews

The Ethics of Hacking 101

Some of the U.S.'s most prestigious cybersecurity university programs make a point of teaching their students offensive skills, but in doing so also must address...

Protesters in Hong Kong Must Weigh the Promise and Risks of Mesh Networking
From ACM News

Protesters in Hong Kong Must Weigh the Promise and Risks of Mesh Networking

In the heart of Hong Kong, where the largest pro-Democracy protest to challenge Beijing since the 1989 Tiananmen Square gathering has been brewing, some protesters...

So You Want to Hack Apple Pay?
From ACM News

So You Want to Hack Apple Pay?

A decade ago, a group of Johns Hopkins University grad students tried to hack one of the first commercially popular Near Field Communication payment systems—the...

For Sale: Systems that Can Secretly Track Where Cellphone ­sers Go Around the Globe
From ACM News

For Sale: Systems that Can Secretly Track Where Cellphone ­sers Go Around the Globe

Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they...

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone
From ACM Opinion

Why One of Cybersecurity's Thought Leaders ­ses a Pager Instead of a Smart Phone

In the computer and network security industry, few people are as well known as Dan Geer.

How Spy Agencies Keep Their 'toys' from Law Enforcement
From ACM News

How Spy Agencies Keep Their 'toys' from Law Enforcement

A little over a decade ago, federal prosecutors used keystroke logging software to steal the encryption password of an alleged New Jersey mobster, Nicodemo Scarfo...

Caught Up in the Nsa Net
From ACM TechNews

Caught Up in the Nsa Net

The Washington Post has published an analysis of about 22,000 surveillance reports collected by the U.S. National Security Agency between 2009 and 2012.

The Case That Might Cripple Facebook
From ACM Opinion

The Case That Might Cripple Facebook

An Irish judge has rendered a preliminary judgment that may have sweeping consequences for U.S. e-commerce firms.

Fcc Unveils 'new Regulatory Paradigm' For Defeating Hackers
From ACM TechNews

Fcc Unveils 'new Regulatory Paradigm' For Defeating Hackers

The Federal Communications Commission is working to expand its role among federal agencies charged with protecting U.S. networks from cyberattacks. 

Brokers ­se 'billions' of Data Points to Profile Americans
From ACM News

Brokers ­se 'billions' of Data Points to Profile Americans

Are you a financially strapped working mother who smokes?

'smart Pills' with Chips, Cameras, and Robotic Parts Raise Legal, Ethical Questions
From ACM News

'smart Pills' with Chips, Cameras, and Robotic Parts Raise Legal, Ethical Questions

Each morning around 6, Mary Ellen Snodgrass swallows a computer chip.

When Driverless Cars Crash, Who's to Blame?
From ACM News

When Driverless Cars Crash, Who's to Blame?

Self-driving cars have an undeniable allure: Think of all the fun things you could do if you didn't have to keep your eyes on the road!

The Military Thinks Bitcoin Could Pose a Threat to National Security
From ACM News

The Military Thinks Bitcoin Could Pose a Threat to National Security

Does Bitcoin risk endangering the nation's safety? The Pentagon thinks it might.

Low-Level Federal Judges Balking at Law Enforcement Requests For Electronic Evidence
From ACM News

Low-Level Federal Judges Balking at Law Enforcement Requests For Electronic Evidence

Judges at the lowest levels of the federal judiciary are balking at sweeping requests by law enforcement officials for cellphone and other sensitive personal data...

Google, Once Disdainful of Lobbying, Now a Master of Washington Influence
From ACM News

Google, Once Disdainful of Lobbying, Now a Master of Washington Influence

In May 2012, the law school at George Mason University hosted a forum billed as a "vibrant discussion" about Internet search competition.

U.S. Rallied 120 Nations in Response to 2012 Cyberattack on American Banks
From ACM TechNews

U.S. Rallied 120 Nations in Response to 2012 Cyberattack on American Banks

In 2012, the Obama administration appealed to 120 nations to help block a wide-ranging cyberattack campaign against U.S. banks 

Tor ­sage in Turkey Surges During Twitter Ban
From ACM News

Tor ­sage in Turkey Surges During Twitter Ban

Since Turkish Prime Minister Recep Tayyip Erdogan implemented a ban on Twitter late last week, Tor usage in the country has surged—with connections nearly doubling...

Federal Agencies Embrace New Technology and Strategies to Find the Enemy Within
From ACM News

Federal Agencies Embrace New Technology and Strategies to Find the Enemy Within

After years of focusing on outside threats, the federal government and its contractors are turning inward, aiming a range of new technologies and counterintelligence...

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.
From ACM Opinion

Hackers Allegedly Stole $400 Million in Bitcoins. Here's How to Catch Them.

On Friday, what had been the world's leading Bitcoin exchange declared bankrutpcy, claiming that hackers had exploited a technical issue called "transaction malleability...

Obama's Big Plan to Protect Businesses from Cyberattack
From ACM News

Obama's Big Plan to Protect Businesses from Cyberattack

It's been a long time coming, and some experts say it isn't enough.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account