Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectManagement
authorArs Technica

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Supply-Chain Attack Hits RubyGems Repository with 725 Malicious Packages
From ACM TechNews

Supply-Chain Attack Hits RubyGems Repository with 725 Malicious Packages

ReversingLabs researchers found more than 725 malicious packages in RubyGems, the official channel for distributing programs and code libraries for the Ruby programming...

Ransomware Forces Hospitals to Turn Away All but Most Critical Patients
From ACM TechNews

Ransomware Forces Hospitals to Turn Away All but Most Critical Patients

Ransomware has crippled hospitals in Alabama and Australia, blocking admission for all but the most critical new patients.

Microsoft Warns Wormable Windows Bug Could Lead to Another WannaCry
From ACM TechNews

Microsoft Warns Wormable Windows Bug Could Lead to Another WannaCry

Microsoft warns a serious vulnerability in Windows Remote Desktop Services could be exploited to launch a WannaCry-level attack against Internet-connected computers...

'RobbinHood' Ransomware Takes Down Baltimore City Government Networks
From ACM TechNews

'RobbinHood' Ransomware Takes Down Baltimore City Government Networks

A "RobbinHood" ransomware attack earlier this week crippled networks used by Baltimore's city government.

They Didn't Buy the DLC: Feature that Could've Prevented 737 Crashes Was Sold As an Option
From ACM News

They Didn't Buy the DLC: Feature that Could've Prevented 737 Crashes Was Sold As an Option

The crashed Lion Air 737 MAX and the Ethiopian Airlines 737 MAX aircraft had more in common than aircraft design and the apparently malfunctioning flight system...

A DNS Hijacking Wave Is Targeting Companies at an Almost ­nprecedented Scale
From ACM TechNews

A DNS Hijacking Wave Is Targeting Companies at an Almost ­nprecedented Scale

Federal authorities and private researchers are warning companies about a wave of domain hijacking attacks.

What’s in the Sweeping Copyright Bill Just Passed by the European Parliament
From ACM News

What’s in the Sweeping Copyright Bill Just Passed by the European Parliament

Legislation now goes to a three-way negotiation within the EU.

Critical PGP and S/MIME Bugs can Reveal Encrypted Emails—­ninstall Now
From ACM News

Critical PGP and S/MIME Bugs can Reveal Encrypted Emails—­ninstall Now

The flaws can expose emails sent in the past and "pose an immediate threat."

What Lies Beneath: The Things Facebook Knows Go Beyond ­ser Data
From ACM News

What Lies Beneath: The Things Facebook Knows Go Beyond ­ser Data

In the wake of the Cambridge Analytica revelations regarding the exposure of profile data for millions of users, Facebook is now facing an investigation into its...

Major Payment Company: 'fewer and Fewer ­se Cases' For Bitcoin Payments
From ACM News

Major Payment Company: 'fewer and Fewer ­se Cases' For Bitcoin Payments

Stripe is one of the most popular ways for small online organizations to accept credit card payments. And in 2014 it became one of the first major payment processors...

Meltdown and Spectre: Here's What Intel, Apple, Microsoft, Others Are Doing About It
From ACM News

Meltdown and Spectre: Here's What Intel, Apple, Microsoft, Others Are Doing About It

The Meltdown and Spectre flaws—two related vulnerabilities that enable a wide range of information disclosure from every mainstream processor, with particularly...

With the Uss mccain Collision, Even Navy Tech Can't Overcome Human Shortcomings
From ACM News

With the Uss mccain Collision, Even Navy Tech Can't Overcome Human Shortcomings

In the darkness of early morning on August 21, the guided-missile destroyer USS John S. McCain collided with a tanker in the Strait of Malacca off Singapore.

For Sale: Your Private Browsing History
From ACM News

For Sale: Your Private Browsing History

The US House of Representatives voted Tuesday to eliminate ISP privacy rules, following the Senate vote to take the same action last week. The legislation to kill...

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping
From ACM TechNews

Google Teaches 'ais' to Invent Their Own Crypto and Avoid Eavesdropping

Google Brain researchers say they have developed artificial intelligence technology that can form encryptions and communicate securely.

Vr Started with Gaming, But It Will Take Over Every Other Industry
From ACM Careers

Vr Started with Gaming, But It Will Take Over Every Other Industry

"We are looking at sensory immersion.

Hints Suggest an Insider Helped the Nsa 'equation Group' Hacking Tools Leak
From ACM News

Hints Suggest an Insider Helped the Nsa 'equation Group' Hacking Tools Leak

A group called the Shadow Brokers made headlines this month by leaking a hacking tool belonging to the NSA's Tailored Access Operations (TAO) team. Now this week...

Smile, You're in the Fbi Face-Recognition Database
From ACM News

Smile, You're in the Fbi Face-Recognition Database

The Federal Bureau of Investigation has access to as many as 411.9 million images as part of its face-recognition database. 

Apple Likely Can't Force Fbi to Disclose How It Got Data from Seized Iphone
From ACM News

Apple Likely Can't Force Fbi to Disclose How It Got Data from Seized Iphone

The US government isn't saying whether it will divulge to Apple the method it used to access the locked iPhone seized by one of the San Bernardino shooters.

Apple Gets Short-Term Win, But New Mysterious Fbi ­nlocking Method Looms
From ACM News

Apple Gets Short-Term Win, But New Mysterious Fbi ­nlocking Method Looms

Less than 24 hours before a highly anticipated Tuesday court session where prosecutors and Apple lawyers would have squared off here in federal court, government...

Encryption Isn't at Stake, the Fbi Knows Apple Already Has the Desired Key
From ACM News

Encryption Isn't at Stake, the Fbi Knows Apple Already Has the Desired Key

Apple has been served with a court order at the FBI's request, demanding that it assist the government agency with unlocking an iPhone 5C that was used by Syed...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account