acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectLegal Aspects
authorThe Washington Post
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Battle to Prevent Another January 6 Features a New Weapon: The Algorithm
From ACM News

The Battle to Prevent Another January 6 Features a New Weapon: The Algorithm

A year after the attack on the Capitol, data scientists say artificial intelligence can help forecast insurrection — with some big concerns.

Complaint to FTC Claims Amazon Search Results Full of Ads 'Unlawfully Deceiving' Consumers
From ACM News

Complaint to FTC Claims Amazon Search Results Full of Ads 'Unlawfully Deceiving' Consumers

More than a quarter of Amazon search results are paid ads, according to the complaint filed by a coalition of labor unions.

Tech Companies Join the Fight to Take Down Hacking Groups
From ACM News

Tech Companies Join the Fight to Take Down Hacking Groups

Google and Microsoft are taking on hackers.

Facebook Reveals Broad Takedown of Global Disinformation Networks
From ACM News

Facebook Reveals Broad Takedown of Global Disinformation Networks

The takedowns described in the company's monthly threat report demonstrate how the cat-and-mouse game between Facebook and bad actors is escalating.

 Happy Hacksgiving: Officials Warn of a Surge of Cyber Threats
From ACM News

Happy Hacksgiving: Officials Warn of a Surge of Cyber Threats

Government agencies are also warning companies and consumers to be on guard against holiday attacks.

Ransomware Hackers Have the Upper Hand
From ACM News

Ransomware Hackers Have the Upper Hand

Hackers put companies under intense pressure to pay ransoms quickly to get their computers systems back online.

Commerce Department Announces Rule Aimed at Stemming Sale of Hacking Tools to Russia, China
From ACM News

Commerce Department Announces Rule Aimed at Stemming Sale of Hacking Tools to Russia, China

The rule is not intended to keep American researchers from working with colleagues overseas to find software flaws.

Messy, Incomplete U.S. Data Hobbles Pandemic Response
From ACM News

Messy, Incomplete U.S. Data Hobbles Pandemic Response

The nation's decentralized, underfunded reporting system hampers efforts to combat the coronavirus.

Federal Government to Expand Use of Facial Recognition Despite Growing Concerns
From ACM News

Federal Government to Expand Use of Facial Recognition Despite Growing Concerns

Federal government to expand use of facial recognition despite growing concerns.

Bye-Bye, Miners! How Ethereum's Big Change Will Work
From ACM News

Bye-Bye, Miners! How Ethereum's Big Change Will Work

The cryptocurrency is jettisoning the "miners" who track and validate transactions on the world's most-used blockchain network.

Apple is Prying into iPhones to Find Sexual Predators
From ACM News

Apple is Prying into iPhones to Find Sexual Predators

Privacy activists worry governments could weaponize the feature.

Oregon Examines Spyware Investment amid Controversy
From ACM News

Oregon Examines Spyware Investment amid Controversy

The Oregon state employee pension fund is one of the largest investors, if not the largest, in a private equity firm that has majority ownership of NSO Group, the...

TSA Issues Cybersecurity Rules for Pipeline Companies
From ACM TechNews

TSA Issues Cybersecurity Rules for Pipeline Companies

A U.S. Transportation Security Administration directive imposes new rules requiring pipeline operators to strengthen their cyberdefenses.

U.S., Allies Accuse China of Hacking Microsoft and Condoning Other Cyberattacks
From ACM News

U.S., Allies Accuse China of Hacking Microsoft and Condoning Other Cyberattacks

This is the first time Washington and other U.S. allies have assigned blame for the Microsoft Exchange hack, which compromised more than 100,000 servers worldwide...

Anatomy of a Ransomware Attack
From ACM News

Anatomy of a Ransomware Attack

Inside the hacks that lock down computer systems and damage businesses.

Google Totally Changing How Ads Track People Around the Internet
From ACM News

Google Totally Changing How Ads Track People Around the Internet

The Internet giant is throwing tracking cookies in the dustbin, prompting big questions about privacy, competition, and advertising.

Feds Recover More Than $2 Million in Ransomware Payments from Colonial Pipeline Hackers
From ACM TechNews

Feds Recover More Than $2 Million in Ransomware Payments from Colonial Pipeline Hackers

U.S. officials say more than $2 million in cryptocurrency payments to the hackers who held Colonial Pipeline hostage in May has been recovered.

Feds Recover More Than $2 Million in Ransomware Payments from Colonial Pipeline Hackers
From ACM News

Feds Recover More Than $2 Million in Ransomware Payments from Colonial Pipeline Hackers

The seizure of cryptocurrency paid by Colonial Pipeline to a Russian hacker ring marks a major milestone for the Department of Justice.  

Hackers hit JBS, the world’s largest meat processor, in ransomware attack
From ACM News

Hackers hit JBS, the world’s largest meat processor, in ransomware attack

The breach is the latest targeting a crucial supply chain, and comes three weeks after the Colonial Pipeline hack disrupted fuel operations in the U.S.

Ransomware Attack Leads to Shutdown of Major U.S. Pipeline System
From ACM News

Ransomware Attack Leads to Shutdown of Major U.S. Pipeline System

The attack on top U.S. operator Colonial Pipeline appears to have been carried out by an Eastern European-based criminal gang.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account