A firmware change to Bluetooth chip sets makes the unwelcome tracking of a device by stalkers, hackers, and others impractical.
Security and Privacy
Fort Knox Your Data: A Guide to Access Controls
Regular audits and continuous monitoring are critical for identifying and addressing potential security vulnerabilities.
There is a critical need for better software design, development, test, and propagation processes.
Cybersecurity in Industrial IoT: Protecting Critical Infrastructure
Today's IIoT environments demand sophisticated, multi-layered security strategies.
How CrowdStrike Stopped Everything
The CrowdStrike global IT outage put millions of systems and their data out of reach.
Partnering to Protect the Power
As the informational needs of the power grid become more complex and the connected “smart grid” expands, so too do the cybersecurity needs of grid operators.
A Security Model for Web-Based Communication
We propose an algorithmic security model based on the widely deployed technologies DNSSEC and Web PKI to cover the dimensions of identification, resolution, and transaction.
Technical Perspective: Revealing the Cracks in AA Services
"A Security Model for Web-Based Communication," by Pouyan Fotouhi Tehrani et al., presents a new study of alerting authorities and their cybersafety measures.
The Vulnerability-Adaptive Protection Paradigm
Resiliency solutions for autonomous machines make trade-offs between resiliency and cost.
Trustworthy AI Using Confidential Federated Learning
Classic federated learning emphasizes security and privacy, at the cost of transparency and accountability. Confidential Federated Learning addresses this gap.
Improving Privacy and Security of Telehealth
Concerns for security call for the development of secure, usable, and privacy-preserving tools for telehealth services.
Global Auto Dealer Management Systems Hacked
Lawsuits claim the attacks exposed consumers' personal information and stopped dealerships' sales, financing, servicing, and payroll operations.
The Digital Degree Certification Revolution in Brazil and Beyond
The issuance and validation of paper-based degree certificates in Brazil presents a significant hurdle.
The U.K. Post Office Scandal: Software Malpractice At Scale
Accounting software should be predictable and boring, not falsely send people to prison. But that's what it did.
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil
The evolution and misuse of public groups on the WhatsApp prompted modifications to the platform’s architecture.
Gradual Differentially Private Programming
The adoption of type systems in recent years has been facilitated by gradual typing.
Ensuring application security from design to operation with DevSecOps.
Data Breach Prevention: Strategies For Proactive Cyber Defense
Data breach prevention techniques help businesses reduce existing threats or recognize potential risks before they result in a breach.
Zero-Knowledge Proofs and Their Role within the Blockchain
An examination of the intricate world of zero-knowledge proofs and how they may be used to enhance blockchain security and privacy.
Security Challenges of Intent-Based Networking
Intent-based networking allows operators to describe the high-level intent of what they want a network to do.
Age Verification Systems Will Be a Personal Identifiable Information Nightmare
Online age verification requirements for websites are a disaster for privacy, and pose a cybersecurity risk.
From Open Access to Guarded Trust
Engineers stand at a unique confluence, where the exhilarating promise of innovation meets the sobering responsibility of trust stewardship.
Technical Perspective: Tracing the Network Traffic Fingerprinting Techniques of OpenVPN
"OpenVPN is Open to VPN Fingerprinting," by Diwen Xue et al., investigates network traffic fingerprinting of a very popular privacy technique—OpenVPN.
OpenVPN Is Open to VPN Fingerprinting
In this paper, we explore the implications of deep packet inspection for VPN detection and blocking.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More