Security Principles for Designing an Unhackable Crypto Wallet
Resilience requires formal rigor, verification tools, and zero-trust assumptions.
Security Principles for Designing an Unhackable Crypto Wallet
Resilience requires formal rigor, verification tools, and zero-trust assumptions.
Two Types of Data Privacy Controls
Precise, sensible, and easy to use terms to differentiate the two intrinsic types of privacy controls will positively impact the accuracy of privacy research and discussions.
Balancing Secrecy and Transparency in Bug Bounty Programs
Embracing transparency while balancing temporary secrecy can lead to a more resilient and accountable software ecosystem.
AI Empowers Novices to Launch Cyberattacks
AI-powered turnkey tools turn those with little technical expertise into cyber monsters.
Beyond Downtime: Architectural Resilience on Hyperscalers
Essential considerations for building durable systems in the cloud era.
The Real, Significant Threat of Shadow AI
Unsanctioned AI tools are a growing risk for organizations, especially those in highly regulated industries where security, compliance, and data integrity are critical.
Turning Servers Against the Cloud
Attacks targeting internal metadata APIs let systems access information about settings and resources in the cloud, including network addresses and URLs.
Integrity will be the primary security challenge for AI systems of the next decade.
Supply Chain Resilience Is More Important than Ever
Cascading relationships that place vendors, partners, and cloud providers into one another’s ecosystems make resilience an essential element of every node.
Beyond the Checkbox: Upgrading the Right to Opt Out
How to make the right to opt out work for everyone.
Homomorphic Technologies Could Process Still-Encrypted Data
Fully homomorphic encryption could stave off the security threats quantum computers pose to current encryption techniques.
Deleting X: Why SIGDOC Left the Platform
The platform does not embrace communication design, privacy, and trust, the group's members say.
Is AI Security Work Best Done In Academia or Industry? Part 2
Academia benefits from the flow of fresh talent, a pristine stream that is seemingly magically, continually replenished.
Malicious AI Models Undermine Software Supply-Chain Security
Trusted repositories, cryptographic validation, and controlled access can help organizations mitigate risks associated with malicious AI models.
A Growing Concern in Cybersecurity
A proactive, continuous approach to cybersecurity is key to protecting systems from the evolving threat of zero-day exploits.
Is AI Security Work Best Done In Academia or Industry? Part 1
Many groundbreaking advances in AI research are coming from industry; the source for AI security advances is less clear.
Unlocking Offensive Security to Stay Ahead of Cyber Threats
Actively identifying and eliminating vulnerabilities by thinking like an attacker has become essential.
Judicial website blocking has several desirable properties in fighting online criminal activities, and could be used safely and effectively in the U.S.
Ransomware: Extortion Is My Business
A look at ransomware, its ecosystems, the impact of its attacks, and the tactics of its attackers.
The Rise of Adaptive Phishing: When AI Learns to Manipulate
Tailored phishing messages that appeal directly to the target's interests or match the tone of a trusted contact are harder to spot than traditional phishing.
AI is being used to open, and close, vulnerable points in production systems.
Experts tracked hacked funds across 12 different blockchains, while law enforcement agencies globally coordinated the efforts.
Privacy Washing through PETs: the Case of Worldcoin
The computing community should prevent the use of PETs (privacy enhancing technologies) for privacy washing.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More