Biometric markers are increasingly popular targets of data theft, potentially endangering far more than your locally stored information…
From ACM NewsDavid Geer Commissioned by CACM Staff| June 23, 2022
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Renegade staff theoretically could insert undetectable backdoors in third-party artificial intelligence (AI) algorithms, enabling hackers to commandeer the AIs...New Scientist From ACM TechNews | May 12, 2022
A circuit board's power consumption can reveal malicious tampering designed to facilitate Trojan attacks to steal sensitive data or crash a device when triggered...New Scientist From ACM TechNews | April 20, 2022
Ward Beullens at IBM Research Zurich in Switzerland easily cracked a cryptography algorithm touted as one of three contenders for a global standard against quantum...New Scientist From ACM TechNews | March 11, 2022
Freely available voice-mimicking software can deceive people and voice-activated tools like smart assistants, according to University of Chicago scientists.
New Scientist From ACM TechNews | October 14, 2021
Researchers at George Washington University say they have built a tool that would allow users to expose fake news without endangering their privacy. The Fuzzy Anonymous...New Scientist From ACM TechNews | September 20, 2021
A computer model developed by researchers at New York’s University of Albany can determine whether an image of a face is a deepfake by examining its pupils.
New Scientist From ACM TechNews | September 15, 2021
It takes an average of 77 days from detection for Google to remove apps that may contain malware from the Google Play Store, accoriding to a recent analysis.
New Scientist From ACM TechNews | August 19, 2021