acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
datePast Year
subjectSecurity
authorArs Technica
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Tesla Hack Gives Thieves Their Own Personal Key
From ACM TechNews

Tesla Hack Gives Thieves Their Own Personal Key

Austrian security researcher Martin Herfurt has demonstrated that electric vehicle company Tesla's updated near-field communication key card can be hacked.

Bluetooth Hack Can Unlock Tesla, Devices
From ACM TechNews

Bluetooth Hack Can Unlock Tesla, Devices

Sultan Qasim Khan at U.K.-based security firm NCC Group  devised an exploit for unlocking Teslas and countless other devices.

Some Top 100,000 Websites Collect Everything You Type--Before You Hit Submit
From ACM TechNews

Some Top 100,000 Websites Collect Everything You Type--Before You Hit Submit

Researchers analyzed the top 100,000 websites and found a significant number record some or all of visitors' typewritten data.

Apple, Google, Microsoft Want to Kill the Password with 'Passkey' Standard
From ACM TechNews

Apple, Google, Microsoft Want to Kill the Password with 'Passkey' Standard

Apple, Google, and Microsoft are launching a "joint effort" to "expand support for a common password-less sign-in standard created by the FIDO Alliance and the...

Gear from Netgear, Linksys, 200 Others Has Unpatched DNS Poisoning Flaw
From ACM TechNews

Gear from Netgear, Linksys, 200 Others Has Unpatched DNS Poisoning Flaw

Researchers at security firm Nozomi Networks identified an unpatched vulnerability in third-party code libraries used by 200 hardware and software vendors.

Apple Rushes Out Patches for Zero-Days Threatening iOS, macOS Users
From ACM TechNews

Apple Rushes Out Patches for Zero-Days Threatening iOS, macOS Users

Apple recently released patches for two critical zero-day vulnerabilities discovered by an anonymous researcher that affect the operating systems of iPhones, iPads...

Researchers Use Decommissioned Satellite to Broadcast Hacker TV
From ACM TechNews

Researchers Use Decommissioned Satellite to Broadcast Hacker TV

Researchers in the Shadytel telecommunications and embedded device hacking group used a decommissioned Canadian satellite to broadcast a livestream to the Northern...

Data-Harvesting Code in Mobile Apps Sends User Data to 'Russia's Google'
From ACM TechNews

Data-Harvesting Code in Mobile Apps Sends User Data to 'Russia's Google'

A researcher found that Yandex, known as "Russia's Google," embedded code in apps for mobile devices that allows data to be sent to servers in Russia.

Behold, a Password Phishing Site that Can Trick Even Savvy Users
From ACM TechNews

Behold, a Password Phishing Site that Can Trick Even Savvy Users

A proof-of-concept "browser in the browser" exploit could phish passwords using a malicious site that does not contain suspicious domains or substitute letters....

New Attack Amplifies DDoSes by 4 Billion-Fold
From ACM TechNews

New Attack Amplifies DDoSes by 4 Billion-Fold

New technique also stretches out distributed denial of service durations to 14 hours.

Bug Lurking for 12 Years Gives Attackers Root on Most Major Linux Distros
From ACM TechNews

Bug Lurking for 12 Years Gives Attackers Root on Most Major Linux Distros

Polkit, a system-wide privilege manager for Unix-like operating systems, contains a 12-year-old memory-corruption vulnerability.

Booby-Trapped Sites Delivered Potent Backdoor Trojan to macOS Users
From ACM TechNews

Booby-Trapped Sites Delivered Potent Backdoor Trojan to macOS Users

Security researchers have uncovered macOS malware that can be installed by exploits almost impossible for most users to detect.

Scammers Put Fake QR Codes on Parking Meters to Intercept Payments
From ACM TechNews

Scammers Put Fake QR Codes on Parking Meters to Intercept Payments

Parking enforcement officers recently found fake quick response code stickers on pay stations in three Texas cities, used to trick people into paying scammers. ...

Thousands of AT&T Customers in the U.S. Infected by Data-Stealing Malware
From ACM TechNews

Thousands of AT&T Customers in the U.S. Infected by Data-Stealing Malware

Researchers at China's Qihoo 360 reported that the EWDoor malware has infected the networking devices of thousands of AT&T Internet customers in the U.S.

'Glowworm Attack' Recovers Audio From Devices' Power LEDs
From ACM TechNews

'Glowworm Attack' Recovers Audio From Devices' Power LEDs

Israeli scientists have demonstrated a novel passive variant of the TEMPEST exploit called Glowworm, which can extract electronic conversations by analyzing devices'...

Hackers Got Past Windows Hello by Tricking Webcam
From ACM TechNews

Hackers Got Past Windows Hello by Tricking Webcam

Researchers uncovered a security feature bypass vulnerability in Microsoft's Windows Hello system that permitted them to manipulate a USB webcam to unlock a Windows...

Chinese Phone Games Now Require Facial Scans to Play at Night
From ACM TechNews

Chinese Phone Games Now Require Facial Scans to Play at Night

Chinese video game publisher Tencent has added a facial recognition system to more than 60 of its China-specific smartphone games.

Microsoft's Emergency Patch Fails to Fix Critical 'PrintNightmare' Vulnerability
From ACM TechNews

Microsoft's Emergency Patch Fails to Fix Critical 'PrintNightmare' Vulnerability

Researchers warn a Microsoft software patch did not fully correct a flaw in the Windows operating system that allows hackers to commandeer infected networks.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account