acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Stealthy Hackers Target Military, Weapons Contractors
From ACM News

Stealthy Hackers Target Military, Weapons Contractors

Analysts at Securonix discovered the attacks but couldn't attribute the campaign to any known threat actors, despite some similarities to past APT37 (Konni) attacks...

PDF Smuggles Microsoft Word Doc to Drop Snake Keylogger Malware
From ACM TechNews

PDF Smuggles Microsoft Word Doc to Drop Snake Keylogger Malware

Threat analysts at HP Wolf Security have discovered a recent malware distribution campaign that uses PDF attachments to transport Word documents with malicious...

Cyberspies Use IP Cameras to Deploy Backdoors, Steal Exchange Emails
From ACM TechNews

Cyberspies Use IP Cameras to Deploy Backdoors, Steal Exchange Emails

An Advanced Persistent Threat gang discovered by researchers at security company Mandiant is penetrating corporate networks to steal Exchange emails from those...

Chinese Hackers Abuse VLC Media Player to Launch Malware Loader
From ACM TechNews

Chinese Hackers Abuse VLC Media Player to Launch Malware Loader

Symantec researchers have identified a campaign perpetrated by a hacker group associated with the Chinese government using VLC Media Player to launch a custom malware...

Hundreds of HP Printer Models Vulnerable to Remote Code Execution
From ACM TechNews

Hundreds of HP Printer Models Vulnerable to Remote Code Execution

HP issued security advisories for three critical-severity vulnerabilities impacting its LaserJet Pro, Pagewide Pro, OfficeJet, Enterprise, Large Format, and DeskJet...

Russia Faces IT Crisis with Just Two Months of Data Storage Left
From ACM TechNews

Russia Faces IT Crisis with Just Two Months of Data Storage Left

The withdrawal of Western cloud computing companies from Russia has left the country with roughly two months before it runs out of IT data storage.

HP Patches 16 UEFI Firmware Bugs Allowing Stealthy Malware Infections
From ACM TechNews

HP Patches 16 UEFI Firmware Bugs Allowing Stealthy Malware Infections

Researchers at Binarly discovered 16 high-impact UEFI firmware vulnerabilities affecting multiple HP models.

New Windows Server Updates Cause DC Boot Loops, Break Hyper-V
From ACM News

New Windows Server Updates Cause DC Boot Loops, Break Hyper-V

The updates cause Windows domain controllers enter a boot loop, with servers getting into an endless cycle of Windows starting and then rebooting after a few minutes...

Honeypot Experiment Reveals What Hackers Want From IoT Devices
From ACM TechNews

Honeypot Experiment Reveals What Hackers Want From IoT Devices

A honeypot experiment has clarified hackers' goals in targeting Internet of Things devices.

Large-Scale Phishing Study Shows Who Bites the Bait More Often
From ACM TechNews

Large-Scale Phishing Study Shows Who Bites the Bait More Often

Researchers at Switzerland's ETH Zurich found that study participants aged 18-19 and those aged 50-59 are most likely to click on phishing links.

BotenaGo Botnet Targets Millions of IoT Devices with 33 Exploits
From ACM TechNews

BotenaGo Botnet Targets Millions of IoT Devices with 33 Exploits

AT&T researchers found the BotenaGo malware botnet uses 33 exploits to attack millions of routers, modems, network attached storage, and Internet of Things devices...

Phishing Attack Uses Morse Code to Hide Malicious URLs
From ACM TechNews

Phishing Attack Uses Morse Code to Hide Malicious URLs

BleepingComputer has identified a new targeted phishing campaign in which emails pretending to be company invoices use Morse code in an attachment to hide malicious...

Researchers Mount Successful GPS Spoofing Attack Against Road Navigation Systems
From ACM TechNews

Researchers Mount Successful GPS Spoofing Attack Against Road Navigation Systems

Researchers have demonstrated an effective global-positioning system spoofing hack against road navigation systems.

New Fingerprinting Techniques Identify ­sers Across Different Browsers on the Same Pc
From ACM TechNews

New Fingerprinting Techniques Identify ­sers Across Different Browsers on the Same Pc

A U.S.-based multi-university research effort has yielded distinct fingerprinting methods to track users when they use different browsers installed on the same...

­ltrasound Tracking Could Be ­sed to Deanonymize Tor ­sers
From ACM TechNews

­ltrasound Tracking Could Be ­sed to Deanonymize Tor ­sers

Ultrasounds emitted by ads or JavaScript code hidden on a page accessed through the Tor Browser can deanonymize Tor users by making nearby phones or computers send...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account