Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorWired

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys
From ACM TechNews

Hackers Can Clone Millions of Toyota, Hyundai, Kia Keys

Researchers found previously unknown vulnerabilities in encryption systems used by in-vehicle devices that communicate at close range with key fobs to unlock the...

The Secret History of Facial Recognition
From ACM News

The Secret History of Facial Recognition

Sixty years ago, a sharecropper's son invented a technology to identify faces. Then the record of his role all but vanished.

Intel Patching the Patch for the Patch for 'Zombieload' Flaw
From ACM TechNews

Intel Patching the Patch for the Patch for 'Zombieload' Flaw

Intel said it will release yet another patch for a microarchitectural data sampling vulnerability that allows hackers to fool microprocessors into exposing protected...

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets
From ACM News

Hackers Can Mess With Voltages to Steal Intel Chips' Secrets

A new attack called Plundervolt gives attackers access to the sensitive data stored in a processor's secure enclave.

Decades-Old Code Putting Millions of Critical Devices at Risk
From ACM TechNews

Decades-Old Code Putting Millions of Critical Devices at Risk

Recently discovered vulnerabilities in a nearly 20-year-old industry standard network protocol from Interpeak could potentially make millions of devices exploitable...

Map Shows All the Code Connections Between Russia's Hacker Groups
From ACM TechNews

Map Shows All the Code Connections Between Russia's Hacker Groups

Israeli cybersecurity firms Check Point and Intezer have charted Russian hackers' toolkits from wide-ranging analysis of 2,500 malware samples.

Google Wants to Help Tech Companies Know Less About You
From ACM News

Google Wants to Help Tech Companies Know Less About You

By releasing its homegrown differential privacy tool, Google will make it easier for any company to boost its privacy bona fides.

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking
From ACM TechNews

Mysterious iOS Attack Changes Everything We Know About iPhone Hacking

Google researchers discovered thousands of iPhones have been compromised with sophisticated spyware over the last two years, contradicting assumptions about the...

The WIRED Guide to Cyberwar
From ACM News

The WIRED Guide to Cyberwar

The threat of cyberwar looms over the future: a new dimension of conflict capable of leapfrogging borders and teleporting the chaos of war to civilians thousands...

How Facebook Catches Bugs in Its 100 Million Lines of Code
From ACM News

How Facebook Catches Bugs in Its 100 Million Lines of Code

For the past four years, Facebook has quietly used a homegrown tool called Zoncolan to find bugs in its massive codebase.

A Zoom Flaw Gives Hackers Easy Access to Your Webcam
From ACM TechNews

A Zoom Flaw Gives Hackers Easy Access to Your Webcam

Hackers can exploit vulnerabilities in the Zoom videoconferencing desktop app to commandeer a user's Webcam, a security researcher warns.

6 ­nexpected Places Hackers Can Find Your Information
From ACM News

6 ­nexpected Places Hackers Can Find Your Information

Sharing facts like your birthday or your parents' names can open you up to identity theft.

Intel Flaw Lets Hackers Siphon Secrets From Millions of PCs
From ACM TechNews

Intel Flaw Lets Hackers Siphon Secrets From Millions of PCs

Intel and a coalition of security researchers have identified a new vulnerability in Intel's chips which could permit the theft of sensitive data from central processing...

Forget about Artificial Intelligence, Extended Intelligence is the Future
From ACM News

Forget about Artificial Intelligence, Extended Intelligence is the Future

We should challenge the cult of Singularity. Artificial Intelligence won't take over the world.

Cracking the Crypto War
From ACM News

Cracking the Crypto War

Ray Ozzie thinks he has an approach for accessing encrypted devices that attains the impossible: it satisfies both law enforcement and privacy purists.

How Google Is Cramming More Data Into Its New Atlantic Cable
From ACM News

How Google Is Cramming More Data Into Its New Atlantic Cable

Google says the fiber optic cable it's building across the Atlantic Ocean will be the fastest of its kind.

China Is Catching ­p to the ­S in A.I. Research, Fast
From ACM News

China Is Catching ­p to the ­S in A.I. Research, Fast

At the world's top computer-vision conference last June, Google and Apple sponsored an academic contest that challenged algorithms to make sense of images from...

NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source
From ACM TechNews

NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source

The U.S. National Security Agency has chosen to open source the cybersecurity tool Ghidra, a reverse-engineering platform that takes "compiled" software and "decompiles"...

Machine Learning Can ­se Tweets to Spot Critical Security Flaws
From ACM News

Machine Learning Can ­se Tweets to Spot Critical Security Flaws

At the endless booths of this week's RSA security trade show in San Francisco, an overflowing industry of vendors will offer any visitor an ad nauseam array of...

Quantum Physics Could Protect the Grid From Hackers, Maybe
From ACM News

Quantum Physics Could Protect the Grid From Hackers, Maybe

Cybersecurity experts have sounded the alarm for years: Hackers are ogling the U.S. power grid.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account