acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
datePast Year
subjectSecurity
authorArs Technica
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Scammers Put Fake QR Codes on Parking Meters to Intercept Payments
From ACM TechNews

Scammers Put Fake QR Codes on Parking Meters to Intercept Payments

Parking enforcement officers recently found fake quick response code stickers on pay stations in three Texas cities, used to trick people into paying scammers. ...

Thousands of AT&T Customers in the U.S. Infected by Data-Stealing Malware
From ACM TechNews

Thousands of AT&T Customers in the U.S. Infected by Data-Stealing Malware

Researchers at China's Qihoo 360 reported that the EWDoor malware has infected the networking devices of thousands of AT&T Internet customers in the U.S.

'Glowworm Attack' Recovers Audio From Devices' Power LEDs
From ACM TechNews

'Glowworm Attack' Recovers Audio From Devices' Power LEDs

Israeli scientists have demonstrated a novel passive variant of the TEMPEST exploit called Glowworm, which can extract electronic conversations by analyzing devices'...

Hackers Got Past Windows Hello by Tricking Webcam
From ACM TechNews

Hackers Got Past Windows Hello by Tricking Webcam

Researchers uncovered a security feature bypass vulnerability in Microsoft's Windows Hello system that permitted them to manipulate a USB webcam to unlock a Windows...

Chinese Phone Games Now Require Facial Scans to Play at Night
From ACM TechNews

Chinese Phone Games Now Require Facial Scans to Play at Night

Chinese video game publisher Tencent has added a facial recognition system to more than 60 of its China-specific smartphone games.

Microsoft's Emergency Patch Fails to Fix Critical 'PrintNightmare' Vulnerability
From ACM TechNews

Microsoft's Emergency Patch Fails to Fix Critical 'PrintNightmare' Vulnerability

Researchers warn a Microsoft software patch did not fully correct a flaw in the Windows operating system that allows hackers to commandeer infected networks.

Vulnerabilities in Billions of Wi-Fi Devices Let Hackers Bypass Firewalls
From ACM TechNews

Vulnerabilities in Billions of Wi-Fi Devices Let Hackers Bypass Firewalls

A security researcher found 12 fragmentation vulnerabilities and aggregation attack exploits in Wi-Fi systems.

Security Researcher Successfully Jailbreaks Apple AirTag
From ACM TechNews

Security Researcher Successfully Jailbreaks Apple AirTag

German security researcher stacksmashing was able to break into, dump, and reflash the microcontroller of Apple's AirTag object-location product.

96% of U.S. Users Opt Out of App Tracking in iOS 14.5, Analytics Find
From ACM TechNews

96% of U.S. Users Opt Out of App Tracking in iOS 14.5, Analytics Find

U.S. users have opted out of application tracking nearly all of the time following Apple's release of iOS 14.5 in April.

Android Sends 20x More Data to Google Than iOS Sends to Apple, Study Says
From ACM TechNews

Android Sends 20x More Data to Google Than iOS Sends to Apple, Study Says

A researcher says the Android operating system transmits about 20 times more information from smartphone handsets to Google than iOS sends to Apple.

New Android Malware Found with Full Range of Spying Capabilities
From ACM News

New Android Malware Found with Full Range of Spying Capabilities

Despite its sophistication, the app can be easy for more experienced users to spot.

The Bitcoin Blockchain Is Helping Keep a Botnet From Being Taken Down
From ACM TechNews

The Bitcoin Blockchain Is Helping Keep a Botnet From Being Taken Down

Researchers found that a botnet they have been following disguised one of its IP addresses in the bitcoin blockchain to guard against a command-and-control server...

High-Performance Computers Under Siege by Newly Discovered Backdoor
From ACM TechNews

High-Performance Computers Under Siege by Newly Discovered Backdoor

Researchers at Slovak security firm Eset said a newly discovered backdoor allows hackers to remotely execute arbitrary commands on some high-performance computer...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account