Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hackers Can Mess With Voltages to Steal Intel Chips' Secrets
From ACM News

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets

A new attack called Plundervolt gives attackers access to the sensitive data stored in a processor's secure enclave.

Decades-Old Code Putting Millions of Critical Devices at Risk
From ACM TechNews

Decades-Old Code Putting Millions of Critical Devices at Risk

Recently discovered vulnerabilities in a nearly 20-year-old industry standard network protocol from Interpeak could potentially make millions of devices exploitable...

Map Shows All the Code Connections Between Russia's Hacker Groups
From ACM TechNews

Map Shows All the Code Connections Between Russia's Hacker Groups

Israeli cybersecurity firms Check Point and Intezer have charted Russian hackers' toolkits from wide-ranging analysis of 2,500 malware samples.

Google Wants to Help Tech Companies Know Less About You
From ACM News

Google Wants to Help Tech Companies Know Less About You

By releasing its homegrown differential privacy tool, Google will make it easier for any company to boost its privacy bona fides.

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking
From ACM TechNews

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking

Google researchers discovered thousands of iPhones have been compromised with sophisticated spyware over the last two years, contradicting assumptions about the...

The WIRED Guide to Cyberwar
From ACM News

The WIRED Guide to Cyberwar

The threat of cyberwar looms over the future: a new dimension of conflict capable of leapfrogging borders and teleporting the chaos of war to civilians thousands...

How Facebook Catches Bugs in Its 100 Million Lines of Code
From ACM News

How Facebook Catches Bugs in Its 100 Million Lines of Code

For the past four years, Facebook has quietly used a homegrown tool called Zoncolan to find bugs in its massive codebase.

A Zoom Flaw Gives Hackers Easy Access to Your Webcam
From ACM TechNews

A Zoom Flaw Gives Hackers Easy Access to Your Webcam

Hackers can exploit vulnerabilities in the Zoom videoconferencing desktop app to commandeer a user's Webcam, a security researcher warns.

6 ­nexpected Places Hackers Can Find Your Information
From ACM News

6 ­nexpected Places Hackers Can Find Your Information

Sharing facts like your birthday or your parents' names can open you up to identity theft.

Intel Flaw Lets Hackers Siphon Secrets From Millions of PCs
From ACM TechNews

Intel Flaw Lets Hackers Siphon Secrets From Millions of PCs

Intel and a coalition of security researchers have identified a new vulnerability in Intel's chips which could permit the theft of sensitive data from central processing...

Forget about Artificial Intelligence, Extended Intelligence is the Future
From ACM News

Forget about Artificial Intelligence, Extended Intelligence is the Future

We should challenge the cult of Singularity. Artificial Intelligence won't take over the world.

Cracking the Crypto War
From ACM News

Cracking the Crypto War

Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: it satisfies both law enforcement and privacy purists.

How Google Is Cramming More Data Into Its New Atlantic Cable
From ACM News

How Google Is Cramming More Data Into Its New Atlantic Cable

Google says the fiber optic cable it's building across the Atlantic Ocean will be the fastest of its kind.

China Is Catching ­p to the ­S in A.I. Research, Fast
From ACM News

China Is Catching ­p to the ­S in A.I. Research, Fast

At the world's top computer-vision conference last June, Google and Apple sponsored an academic contest that challenged algorithms to make sense of images from...

NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source
From ACM TechNews

NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source

The U.S. National Security Agency has chosen to open source the cybersecurity tool Ghidra, a reverse-engineering platform that takes "compiled" software and "decompiles"...

Machine Learning Can ­se Tweets to Spot Critical Security Flaws
From ACM News

Machine Learning Can ­se Tweets to Spot Critical Security Flaws

At the endless booths of this week's RSA security trade show in San Francisco, an overflowing industry of vendors will offer any visitor an ad nauseam array of...

Quantum Physics Could Protect the Grid From Hackers, Maybe
From ACM News

Quantum Physics Could Protect the Grid From Hackers, Maybe

Cybersecurity experts have sounded the alarm for years: Hackers are ogling the U.S. power grid.

There's No Good Reason to Trust Blockchain Technology
From ACM News

There's No Good Reason to Trust Blockchain Technology

Opinion by Bruce Schneier, a security technologist who teaches at the Harvard Kennedy School.

The Elite Intel Team Still Fighting Meltdown and Spectre
From ACM News

The Elite Intel Team Still Fighting Meltdown and Spectre

Throughout 2018, researchers found exploitable weaknesses related to "speculative execution" vulnerabilities.

How Russian Trolls ­sed Meme Warfare to Divide America
From ACM News

How Russian Trolls ­sed Meme Warfare to Divide America

There's a meme on Instagram, circulated by a group called "Born Liberal." A fist holds a cluster of strings, reaching down into people with television sets for...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account