The Association for Computing Machinery has named Bob Metcalfe as recipient of the 2022 ACM A.M. Turing Award for the invention…
From ACM CareersACM| March 22, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Polkit, a system-wide privilege manager for Unix-like operating systems, contains a 12-year-old memory-corruption vulnerability.
Ars Technica From ACM TechNews | January 31, 2022
Security researchers have uncovered macOS malware that can be installed by exploits almost impossible for most users to detect.
Ars Technica From ACM TechNews | January 28, 2022
Parking enforcement officers recently found fake quick response code stickers on pay stations in three Texas cities, used to trick people into paying scammers.
...Ars Technica From ACM TechNews | January 18, 2022
Researchers at China's Qihoo 360 reported that the EWDoor malware has infected the networking devices of thousands of AT&T Internet customers in the U.S.
Ars Technica From ACM TechNews | December 9, 2021
Israeli scientists have demonstrated a novel passive variant of the TEMPEST exploit called Glowworm, which can extract electronic conversations by analyzing devices'...Ars Technica From ACM TechNews | August 11, 2021
Researchers uncovered a security feature bypass vulnerability in Microsoft's Windows Hello system that permitted them to manipulate a USB webcam to unlock a Windows...Ars Technica From ACM TechNews | July 26, 2021
Chinese video game publisher Tencent has added a facial recognition system to more than 60 of its China-specific smartphone games.
Ars Technica From ACM TechNews | July 16, 2021
Researchers warn a Microsoft software patch did not fully correct a flaw in the Windows operating system that allows hackers to commandeer infected networks.
Ars Technica From ACM TechNews | July 9, 2021
A security researcher found 12 fragmentation vulnerabilities and aggregation attack exploits in Wi-Fi systems.
Ars Technica From ACM TechNews | May 24, 2021
German security researcher stacksmashing was able to break into, dump, and reflash the microcontroller of Apple's AirTag object-location product.
Ars Technica From ACM TechNews | May 13, 2021
U.S. users have opted out of application tracking nearly all of the time following Apple's release of iOS 14.5 in April.
Ars Technica From ACM TechNews | May 12, 2021
A researcher says the Android operating system transmits about 20 times more information from smartphone handsets to Google than iOS sends to Apple.
Ars Technica From ACM TechNews | March 31, 2021
Researchers found that a botnet they have been following disguised one of its IP addresses in the bitcoin blockchain to guard against a command-and-control server...Ars Technica From ACM TechNews | March 4, 2021
Researchers at Slovak security firm Eset said a newly discovered backdoor allows hackers to remotely execute arbitrary commands on some high-performance computer...Ars Technica From ACM TechNews | February 3, 2021
Investigators with Google's Project Zero exploit research team uncovered a hacking campaign that used four zero-day exploits to install malware on Android and Windows...Ars Technica From ACM TechNews | January 21, 2021
Hackers can exploit the Telegram messenger application employed in Android devices and iPhones to pinpoint users' precise locations.
Ars Technica From ACM TechNews | January 7, 2021
Niels Teusink, a researcher at Netherlands-based security firm Eye Control, found that hackers are attempting to exploit a backdoor built into several Zyxel device...Ars Technica From ACM TechNews | January 6, 2021
Google, Mozilla, Apple, and Microsoft are partnering to stop Kazakhstan's government from decrypting and reading HTTPS-encrypted traffic between citizens and...Ars Technica From ACM TechNews | December 22, 2020