acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
datePast Year
subjectCommunications / Networking
authorWired
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Europe's New Law Will Force Secretive TikTok to Open Up
From ACM News

Europe's New Law Will Force Secretive TikTok to Open Up

The Digital Services Act will extract more new information from the young app than from older platforms like Facebook.

Russia Is Leaking Data Like a Sieve
From ACM News

Russia Is Leaking Data Like a Sieve

Ukraine claims to have doxed Russian troops and spies, while hacktivists are regularly leaking private information from Russian organizations.

Russia Inches Toward Its Splinternet Dream
From ACM News

Russia Inches Toward Its Splinternet Dream

For years, the country has been trying to create its own sovereign Internet—a goal given new impetus by the backlash to its invasion of Ukraine.

Mysterious Satellite Hack Has Victims Far Beyond Ukraine
From ACM News

Mysterious Satellite Hack Has Victims Far Beyond Ukraine

The biggest hack since Russia's war began knocked thousands of people offline. The spillover extends deep into Europe.

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows
From ACM News

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows

Members of the hacker gang may act in Russia's interest, but their links to the FSB and Cozy Bear hackers appear ad hoc.

Hackers Find a New Way to Deliver Devastating DDoS Attacks
From ACM News

Hackers Find a New Way to Deliver Devastating DDoS Attacks

Cybercriminals are exploiting a fleet of more than 100,000 misconfigured servers to knock websites offline.

Biden Puts Big Tech's Favorite Business Model on Notice
From ACM News

Biden Puts Big Tech's Favorite Business Model on Notice

The regulation of surveillance advertising used to be a fringe idea. Now it's in the State of the Union address, at least when it comes to kids.

When Mind Melds With Machine, Who's in Control?
From ACM News

When Mind Melds With Machine, Who's in Control?

Brain-computer interfaces are getting better all the time—and they're about to land us in a philosophical quagmire.

How to Fix Facebook, According to Facebook Employees
From ACM News

How to Fix Facebook, According to Facebook Employees

Internal research documents provide a blueprint for solving the company's biggest problems.

It's Not Easy to Control Police Use of Tech—Even With a Law
From ACM News

It's Not Easy to Control Police Use of Tech—Even With a Law

A key backer of a 2018 Oakland law to rein in tools like automated license plate readers says the city is not following the rules.

A Stanford Proposal Over AI's 'Foundations' Ignites Debate
From ACM News

A Stanford Proposal Over AI's 'Foundations' Ignites Debate

A research paper that dubs some artificial intelligence models "foundational" is sparking a dispute over the future of the field.

Bad Solar Storm Could Cause an 'Internet Apocalypse'
From ACM TechNews

Bad Solar Storm Could Cause an 'Internet Apocalypse'

A study by Sangeetha Abdu Jyothi at the University of California, Irvine on the potential impact of a coronal mass ejection on the global Internet finds that continent...

Millions of Web Camera, Baby Monitor Feeds Exposed
From ACM TechNews

Millions of Web Camera, Baby Monitor Feeds Exposed

Researchers have identified a vulnerability in a software development kit affecting more than 83 million smart devices.

Messaging Apps Have an Eavesdropping Problem
From ACM TechNews

Messaging Apps Have an Eavesdropping Problem

Google's Project Zero researcher Natalie Silvanovich found vulnerabilities in messaging apps that add eavesdropping bugs without requiring users to click a malicious...

NFC Flaws Let Researchers Hack ATMs by Waving a Phone
From ACM TechNews

NFC Flaws Let Researchers Hack ATMs by Waving a Phone

An Android app can exploit flaws in near-field communication systems, enabling ATMs and a variety of point-of-sale terminals to be hacked.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account