By knitting together multiple components and data streams, multimodal AI offers the promise of smarter, more human-like systems…
From ACM NewsSamuel Greengard| December 7, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
A post-quantum cryptography (PQC) algorithm developed by researchers at Google and Switzerland's ETH Zurich enables quantum-resistant encryption for FIDO2 security...Ars Technica From ACM TechNews | August 24, 2023
General Bytes reported that over $1.5 million in bitcoin was drained from Internet-accessible wallets via its bitcoin ATMs by hackers that exploited a previously...Ars Technica From ACM TechNews | March 27, 2023
Researchers at Slovak cybersecurity firm ESET have found the first real-world case of Unified Extensible Firmware Interface malware that can take over a computer's...Ars Technica From ACM TechNews | March 9, 2023
Research suggests that hackers can easily circumvent Endpoint Detection and Response systems, the malware detecting and blocking solutions on which organizations...Ars Technica From ACM TechNews | September 6, 2022
Researchers ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.
Ars Technica From ACM TechNews | August 3, 2022
Researchers have discovered at least 80 routers in North America and Europe have been infected by a remote access Trojan as part of a larger hacking campaign.
Ars Technica From ACM TechNews | July 7, 2022
Researchers at security firm Nozomi Networks identified an unpatched vulnerability in third-party code libraries used by 200 hardware and software vendors.
Ars Technica From ACM TechNews | May 6, 2022
Apple recently released patches for two critical zero-day vulnerabilities discovered by an anonymous researcher that affect the operating systems of iPhones, iPads...Ars Technica From ACM TechNews | April 7, 2022
Polkit, a system-wide privilege manager for Unix-like operating systems, contains a 12-year-old memory-corruption vulnerability.
Ars Technica From ACM TechNews | January 31, 2022
Security researchers have uncovered macOS malware that can be installed by exploits almost impossible for most users to detect.
Ars Technica From ACM TechNews | January 28, 2022
Researchers warn a Microsoft software patch did not fully correct a flaw in the Windows operating system that allows hackers to commandeer infected networks.
Ars Technica From ACM TechNews | July 9, 2021
German security researcher stacksmashing was able to break into, dump, and reflash the microcontroller of Apple's AirTag object-location product.
Ars Technica From ACM TechNews | May 13, 2021
The U.S. Federal Bureau of Investigation and Department of Homeland Security have detected attackers exploiting a Windows vulnerability against state and local...Ars Technica From ACM TechNews | October 16, 2020
Microsoft warns a high-impact vulnerability that allows hackers to instantly take control of Windows' Active Directory is being actively exploited by malicious...Ars Technica From ACM TechNews | October 1, 2020
ReversingLabs researchers found more than 725 malicious packages in RubyGems, the official channel for distributing programs and code libraries for the Ruby programming...Ars Technica From ACM TechNews | April 30, 2020
The pilots of Ethiopia Airlines Flight 302 apparently followed the proper steps to shut down an errant flight control system as they struggled to regain control...Ars Technica From ACM News | April 4, 2019
The crashed Lion Air 737 MAX and the Ethiopian Airlines 737 MAX aircraft had more in common than aircraft design and the apparently malfunctioning flight system...Ars Technica From ACM News | March 22, 2019