acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectLegal Aspects
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


DARPA Is Developing a Search Engine For the Dark Web
From ACM News

DARPA Is Developing a Search Engine For the Dark Web

A new search engine being developed by Darpa aims to shine a light on the dark web and uncover patterns and relationships in online data to help law enforcement...

Nsa Acknowledges What We All Feared: Iran Learns From Us Cyberattacks
From ACM News

Nsa Acknowledges What We All Feared: Iran Learns From Us Cyberattacks

After the Stuxnet digital weapon was discovered on machines in Iran in 2010, many security researchers warned that US adversaries would learn from this and other...

AI Won't End the World, But It Might Take Your Job
From ACM News

AI Won't End the World, But It Might Take Your Job

There's been a lot of fear about the future of artificial intelligence.

Why the Silk Road Trial Matters
From ACM Opinion

Why the Silk Road Trial Matters

Ross Ulbricht is finally getting his day in court, 15 months after plainclothes FBI agents grabbed him in the science fiction section of a San Francisco library...

The Leap Second Is About to Rattle the Internet. But There's a Plot to Kill It
From ACM News

The Leap Second Is About to Rattle the Internet. But There's a Plot to Kill It

The Qantas Airways computers started crashing just after midnight.

A Cyberattack Has Caused Confirmed Physical Damage For the Second Time Ever
From ACM News

A Cyberattack Has Caused Confirmed Physical Damage For the Second Time Ever

Amid all the noise the Sony hack generated over the holidays, a far more troubling cyber attack was largely lost in the chaos. Unless you follow security news closely...

Bots Now Outnumber Humans on the Web
From ACM News

Bots Now Outnumber Humans on the Web

Diogo Mónica once wrote a short computer script that gave him a secret weapon in the war for San Francisco dinner reservations.

Data From Our Wearables Is Now Courtroom Fodder
From ACM News

Data From Our Wearables Is Now Courtroom Fodder

Courtrooms typically lag in technological innovation.

An Interface For Tracking Botnets That's Fit For a Sci-Fi Starship
From ACM News

An Interface For Tracking Botnets That's Fit For a Sci-Fi Starship

What do you get when you ask a bunch of digital artists to dream up a state-of-the-art tool for fighting cybercrime?

Google Can Now Tell You're Not a Robot With Just One Click
From ACM News

Google Can Now Tell You're Not a Robot With Just One Click

When Alan Turing first conceived of the Turing Test in 1947, he suggested that a computer program’s resemblance to a human mind could be gauged by making it answer...

Hackers Gather For Cyberwar in an Intense 48-Hour Sim
From ACM Careers

Hackers Gather For Cyberwar in an Intense 48-Hour Sim

Locked Shields is among the world's preeminent cyber attack simulations.

The ­npatchable Malware That Infects ­sbs Is Now on the Loose
From ACM News

The ­npatchable Malware That Infects ­sbs Is Now on the Loose

It's been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference...

The Most Wanted Man in the World
From ACM News

The Most Wanted Man in the World

The message arrives on my "clean machine," a MacBook Air loaded only with a sophisticated encryption package.

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges
From ACM Careers

Meet the Puzzle Mastermind Who Designs Def Con's Hackable Badges

Def Con is one of the world's biggest hacker conventions, an annual gathering of security experts, cryptographers and at least a few people who could surreptitiously...

Watch This Wireless Hack Pop a Car's Locks in Minutes
From ACM News

Watch This Wireless Hack Pop a Car's Locks in Minutes

Shims and coat hangers are the clumsy tools of last century's car burglars.

The Weird Reasons Why People Make ­p False Identities on the Internet
From ACM Opinion

The Weird Reasons Why People Make ­p False Identities on the Internet

Sockpuppetry—using false identities for deception—is centuries old, but the advent of the web has made creating sockpuppets, and falling for their tricks, easier...

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud
From ACM News

How Hackers Hid a Money-Mining Botnet in Amazon's Cloud

Hackers have long used malware to enslave armies of unwitting PCs, but security researchers Rob Ragan and Oscar Salazar had a different thought: Why steal computing...

The Moral Hazards and Legal Conundrums of Our Robot-Filled Future
From ACM Opinion

The Moral Hazards and Legal Conundrums of Our Robot-Filled Future

The robots are coming, and they're getting smarter.

How Google Map Hackers Can Destroy a Business at Will
From ACM Careers

How Google Map Hackers Can Destroy a Business at Will

Washington DC-area residents with a hankering for lion meat lost a valuable source of the (yes, legal) delicacy last year when a restaurant called the Serbian Crown...

The ­ltra-Simple App That Lets Anyone Encrypt Anything
From ACM News

The ­ltra-Simple App That Lets Anyone Encrypt Anything

Encryption is hard.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account