acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectLegal Aspects
authorArs Technica
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Deepfake Audio Has a Tell
From ACM TechNews

Deepfake Audio Has a Tell

Researchers at the University of Florida can detect audio deepfakes by measuring acoustic and fluid dynamic distinctions between organic and synthetic voice samples...

Cops Wanted to Keep Mass Surveillance App Secret; Privacy Advocates Refused
From ACM News

Cops Wanted to Keep Mass Surveillance App Secret; Privacy Advocates Refused

Fog Reveal is "almost invisible" when attempting to search for it online.

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour
From ACM TechNews

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour

Researchers ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.

YouTube Content Creator Credentials Are Under Siege by YTStealer Malware
From ACM TechNews

YouTube Content Creator Credentials Are Under Siege by YTStealer Malware

A researcher at security firm Intezer identified a new malware that can steal YouTube content creators' authentication credentials.

FCC Lets Starlink Offer Internet Service in Moving Vehicles
From ACM News

FCC Lets Starlink Offer Internet Service in Moving Vehicles

"These services, never before available, promise the potential for expanding reach to remote and rural areas and facilitating higher quality broadband services...

Wide Range of Routers Under Attack by Sophisticated Malware
From ACM TechNews

Wide Range of Routers Under Attack by Sophisticated Malware

Researchers have discovered at least 80 routers in North America and Europe have been infected by a remote access Trojan as part of a larger hacking campaign.

Tesla Hack Gives Thieves Their Own Personal Key
From ACM TechNews

Tesla Hack Gives Thieves Their Own Personal Key

Austrian security researcher Martin Herfurt has demonstrated that electric vehicle company Tesla's updated near-field communication key card can be hacked.

'Tough to Forge' Digital Driver's License Actually Easy to Forge
From ACM TechNews

'Tough to Forge' Digital Driver's License Actually Easy to Forge

Security researchers have found that the supposedly hard-to-counterfeit digital driver's licenses in use in New South Wales, Australia, actually can be altered...

Some Top 100,000 Websites Collect Everything You Type--Before You Hit Submit
From ACM TechNews

Some Top 100,000 Websites Collect Everything You Type--Before You Hit Submit

Researchers analyzed the top 100,000 websites and found a significant number record some or all of visitors' typewritten data.

Gear from Netgear, Linksys, 200 Others Has Unpatched DNS Poisoning Flaw
From ACM TechNews

Gear from Netgear, Linksys, 200 Others Has Unpatched DNS Poisoning Flaw

Researchers at security firm Nozomi Networks identified an unpatched vulnerability in third-party code libraries used by 200 hardware and software vendors.

Your iOS App May Still Be Covertly Tracking You, Despite What Apple Says
From ACM TechNews

Your iOS App May Still Be Covertly Tracking You, Despite What Apple Says

Researchers at the U.K.’s University of Oxford found that iOS apps can still track users without explicit permission.

Apple Rushes Out Patches for Zero-Days Threatening iOS, macOS Users
From ACM TechNews

Apple Rushes Out Patches for Zero-Days Threatening iOS, macOS Users

Apple recently released patches for two critical zero-day vulnerabilities discovered by an anonymous researcher that affect the operating systems of iPhones, iPads...

Data-Harvesting Code in Mobile Apps Sends User Data to 'Russia's Google'
From ACM TechNews

Data-Harvesting Code in Mobile Apps Sends User Data to 'Russia's Google'

A researcher found that Yandex, known as "Russia's Google," embedded code in apps for mobile devices that allows data to be sent to servers in Russia.

Behold, a Password Phishing Site that Can Trick Even Savvy Users
From ACM TechNews

Behold, a Password Phishing Site that Can Trick Even Savvy Users

A proof-of-concept "browser in the browser" exploit could phish passwords using a malicious site that does not contain suspicious domains or substitute letters....

Scammers Put Fake QR Codes on Parking Meters to Intercept Payments
From ACM TechNews

Scammers Put Fake QR Codes on Parking Meters to Intercept Payments

Parking enforcement officers recently found fake quick response code stickers on pay stations in three Texas cities, used to trick people into paying scammers. ...

Chinese Phone Games Now Require Facial Scans to Play at Night
From ACM TechNews

Chinese Phone Games Now Require Facial Scans to Play at Night

Chinese video game publisher Tencent has added a facial recognition system to more than 60 of its China-specific smartphone games.

Microsoft's Emergency Patch Fails to Fix Critical 'PrintNightmare' Vulnerability
From ACM TechNews

Microsoft's Emergency Patch Fails to Fix Critical 'PrintNightmare' Vulnerability

Researchers warn a Microsoft software patch did not fully correct a flaw in the Windows operating system that allows hackers to commandeer infected networks.

Newly Discovered Vigilante Malware Outs Software Pirates, Blocks Them
From ACM TechNews

Newly Discovered Vigilante Malware Outs Software Pirates, Blocks Them

SophosLabs researcher Andrew Brandt has discovered malware that identifies and blocks software pirates.

Self-Driving Waymo Trucks to Haul Loads Between Houston, Fort Worth
From ACM TechNews

Self-Driving Waymo Trucks to Haul Loads Between Houston, Fort Worth

Waymo and trucking company JB Hunt have partnered to haul cargo loads autonomously between Houston and Fort Worth, TX.

Vulnerabilities in Billions of Wi-Fi Devices Let Hackers Bypass Firewalls
From ACM TechNews

Vulnerabilities in Billions of Wi-Fi Devices Let Hackers Bypass Firewalls

A security researcher found 12 fragmentation vulnerabilities and aggregation attack exploits in Wi-Fi systems.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account