Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Kaiji Malware Targets IoT Devices Via SSH Brute-Force Attacks
From ACM TechNews

Kaiji Malware Targets IoT Devices Via SSH Brute-Force Attacks

Researchers have discovered a new strain of malware built to infect Linux-based servers and smart Internet of Things devices.

Supercomputers Hacked Across Europe to Mine Cryptocurrency
From ACM TechNews

Supercomputers Hacked Across Europe to Mine Cryptocurrency

Hackers have compromised multiple supercomputers in the U.K., Germany, Switzerland, and possibly Spain with cryptocurrency-mining malware.

Australians Urged to Take Up Mental Health Telehealth, Put On 'Digital Sunscreen'
From ACM TechNews

Australians Urged to Take Up Mental Health Telehealth, Put On 'Digital Sunscreen'

Since the Australian government announced it would fast-track digital alternatives to in-person medical care, a million mental health telehealth consultations have...

Cybersecurity Staff Are Being Transferred to IT Support, Adding to the Risk of Data Breaches
From ACM TechNews

Cybersecurity Staff Are Being Transferred to IT Support, Adding to the Risk of Data Breaches

Nearly half of 256 cybersecurity professionals polled reported having been reassigned to general IT tasks, due to the global COVID-19 outbreak.

Programming Languages: Kotlin Rises Fastest but JavaScript Lures Millions More Developers
From ACM TechNews

Programming Languages: Kotlin Rises Fastest but JavaScript Lures Millions More Developers

Kotlin has been the fastest-growing programming language over the past two years, according to developer analyst SlashData.

Academics Steal Data From Air-Gapped Systems Using PC Fan Vibrations
From ACM TechNews

Academics Steal Data From Air-Gapped Systems Using PC Fan Vibrations

Academics have developed a technique for stealing data from air-gapped systems by manipulating the vibrations of the fans inside computers.

Docker Servers Targeted by Kinsing Malware Campaign
From ACM TechNews

Docker Servers Targeted by Kinsing Malware Campaign

Over the past few months, a malware campaign has been scanning the Internet for Docker servers running API ports exposed without a password.

Hacker Group Is Eavesdropping on Corporate Email, FTP Traffic
From ACM TechNews

Hacker Group Is Eavesdropping on Corporate Email, FTP Traffic

The Chinese security firm Qihoo 360 reports that a hacker group has been eavesdropping on corporate networks since at least early December.

Crypto-Mining Botnet Has Been Hijacking MSSQL Servers for Almost Two Years
From ACM TechNews

Crypto-Mining Botnet Has Been Hijacking MSSQL Servers for Almost Two Years

A malware botnet has been launching brute-force attacks against Microsoft SQL databases for nearly two years.

COVID-19 Malware Will Wipe Your PC, Rewrite MBR
From ACM TechNews

COVID-19 Malware Will Wipe Your PC, Rewrite MBR

ZDNet has identified five COVID-19-themed malware strains that can wipe an infected PC's files or rewrite its master boot record (MBR).

Software Release Cycles Accelerate, but Automation Is Not Keeping Up
From ACM TechNews

Software Release Cycles Accelerate, but Automation Is Not Keeping Up

A Cloud Native Computing Foundation survey of 1,337 managers and practitioners found that most software developer outfits are delivering weekly or faster releases...

Bugs in Open Source Software Hit a Record High
From ACM TechNews

Bugs in Open Source Software Hit a Record High

The number of open source software vulnerabilities identified rose from 4,100 last year to 6,100 this year, according to security firm WhiteSource.

Modern RAM Still Vulnerable to Rowhammer Attacks
From ACM TechNews

Modern RAM Still Vulnerable to Rowhammer Attacks

Extensive mitigations deployed during the last six years have failed to eliminate modern random-access memory (RAM) cards' vulnerability to Rowhammer exploits. ...

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why
From ACM TechNews

Hacking Victims Are Uncovering Cyberattacks Faster; GDPR Is the Reason Why

GDPR has been linked to quicker cyberattack discovery times in the European Union. 

The Top 10 Software Flaws Used by Crooks
From ACM TechNews

The Top 10 Software Flaws Used by Crooks

Researchers at cybersecurity firm Recorded Future report that eight of the top 10 software flaws most commonly exploited last year were associated with Microsoft...

Australia Focusing on Blockchain Potential with New Roadmap
From ACM TechNews

Australia Focusing on Blockchain Potential with New Roadmap

Australia's government has released a blockchain roadmap outlining a strategy to facilitate job creation, economic growth, more cost-efficient business, and higher...

Microsoft Discloses Security Breach of Customer Support Database
From ACM News

Microsoft Discloses Security Breach of Customer Support Database

Five servers storing customer support analytics were accidentally exposed online in December 2019.

Hundreds of Millions of Cable Modems Vulnerable to Cable Haunt Vulnerability
From ACM TechNews

Hundreds of Millions of Cable Modems Vulnerable to Cable Haunt Vulnerability

Danish researchers reported a security vulnerability affecting cable modems that use Broadcom chips, which is believed to impact about 200 million cable modems...

Chinese Hacker Group Caught Bypassing 2FA
From ACM TechNews

Chinese Hacker Group Caught Bypassing 2FA

Dutch cybersecurity firm Fox-IT said in a report that a hacker group associated with the Chinese government has been bypassing two-factor authentication (2FA) in...

Apple Opens Public Bug Bounty Program, Publishes Rules
From ACM TechNews

Apple Opens Public Bug Bounty Program, Publishes Rules

Apple has formally opened its bug bounty program to all researchers and outlined the program's rules on its website. The maximum available bounty is $1.5 million...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account