Privacy Washing through PETs: the Case of Worldcoin
The computing community should prevent the use of PETs (privacy enhancing technologies) for privacy washing.
Privacy Washing through PETs: the Case of Worldcoin
The computing community should prevent the use of PETs (privacy enhancing technologies) for privacy washing.
Security Research Gaps Leave Critical Infrastructure Open to Cyberattack
The risk of attack on industrial controls is greater for today's interconnected systems than for those in the isolated world of Stuxnet.
Web 3.0 Requires Data Integrity
It’s time for new integrity-focused standards to enable the trusted AI services of tomorrow.
Cyber Trust Mark to Distinguish Secure Smart Home Devices
The U.S. Cyber Trust Mark program is a mechanism for providers of wireless smart home devices to test and certify the security of their products.
Beyond Compliance: Security Documentation as a Strategic Asset
It’s time to stop viewing security documentation as a necessary evil and start leveraging it as a strategic asset.
Researchers are tuning in on ways to turn down the volume with fabrics and materials that buffer, baffle, and block sound waves.
Willow and the Countdown to Quantum Breaches
The ever-increasing speed of quantum computers bodes both well and poorly for cybersecurity.
Why Policies and Training Fail Without a Strong Cybersecurity Culture
Organizations must foster a culture of trust where employees feel comfortable discussing security concerns openly.
Reasons to Raise the Cyber-Shields
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite
An investigation of vulnerabilities within the TCP/IP protocol suite that can be exploited by forged ICMP errors.
A Glimpse Into the Pandora’s Box
A combination of safety measures and safety labels should be developed and employed on how AI models in applications analyze camera frames in real time.
R2T: Instance-Optimal Truncation for Differentially Private Query Evaluation with Foreign Keys
The first DP mechanism for answering arbitrary SPJA queries in a database with foreign-key constraints.
Technical Perspective: Toward Building a Differentially Private DBMS
The paper is an important step toward automatically ensuring privacy for arbitrary computations.
AI Agents: Automation is Not Enough
AI Agents adapt to changes, learn from feedback, and can act autonomously or in collaboration with humans or other agents.
Infostealers have been siphoning sensitive data for more than 16 years, since the first banking Trojan stole usernames and passwords.
It Is Time to Standardize Principles and Practices for Software Memory Safety
Memory-safety standardization is an essential step to promoting universal strong memory safety in government and industry, and to ensure access to more secure software for all.
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions
There seems to be a gap in how cryptographic and non-cryptographic hash functions are designed.
It simply is not appropriate to write code that will be connected to the Internet in an unsafe language such as C.
How Software Bugs led to ‘One of the Greatest Miscarriages of Justice’ in British History
Bad coding and bad testing characterize the software that led to wrongful convictions, financial ruin, and four suicides.
Strengthening Security Throughout the ML/AI Lifecycle
Automation, audits, and access control are some of the ways to enhance security in ML systems.
Zero-Trust Security in Software Development
The zero-trust security model is a proactive approach to overcoming potential threats and enhancing application security.
It’s Another Attack on the U.S. Capitol
Using the same password for business and personal accounts is a common but risky practice that creates vulnerabilities.
Aides or staffers registered official email addresses and passwords on vulnerable third-party sites, putting those credentials at risk.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More