acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
datePast Year
subjectSecurity
authorZDNet

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


This One Change Could Protect Your Systems From Attack. So Why Don't More Companies Do It?
From ACM News

This One Change Could Protect Your Systems From Attack. So Why Don't More Companies Do It?

One 'boring but really important' change could improve your security posture significantly. But not everyone does it.

Millions of Older Broadband Routers Have Security Flaws, Warn Researchers
From ACM TechNews

Millions of Older Broadband Routers Have Security Flaws, Warn Researchers

Millions of U.K. households use old broadband routers that hackers could exploit.

This Massive DDoS Attack Took Large Sections of a Country's Internet Offline
From ACM News

This Massive DDoS Attack Took Large Sections of a Country's Internet Offline

More than 200 organizations across Belgium, including the government and parliament, were affected by a DDoS attack that overwhelmed them with bad traffic.

Microsoft Finds Memory Allocation Holes in Range of IoT, Industrial Technology
From ACM TechNews

Microsoft Finds Memory Allocation Holes in Range of IoT, Industrial Technology

A Microsoft security research unit discovered a number of poor memory allocation operations in code used in Internet of Things and operational technology.

Emotet Botnet Harvested 4.3 Million eMail Addresses; FBI Using 'Have I Been Pwned' to Alert the Victims
From ACM News

Emotet Botnet Harvested 4.3 Million eMail Addresses; FBI Using 'Have I Been Pwned' to Alert the Victims

The law enforcement agency is working with the data breach service to alert people that their information may have been harvested by the botnet.

These New Vulnerabilities put Millions of IoT Devices at Risk, so Patch Now
From ACM News

These New Vulnerabilities put Millions of IoT Devices at Risk, so Patch Now

Detailed by researchers at Forescout, the Name:Wreck vulnerabilities could allow attackers to control devices and remotely execute code, act as a gateway to the...

Firmware Attacks Are on the Rise and You Aren't Worrying About Them Enough
From ACM News

Firmware Attacks Are on the Rise and You Aren't Worrying About Them Enough

Businesses are too busy patching to worry about firmware attacks, according to a Microsoft-commissioned study.  

High Severity Linux Network Security Holes Found, Fixed
From ACM TechNews

High Severity Linux Network Security Holes Found, Fixed

Positive Technologies' Alexander Popov detected five high-severity security vulnerabilities in the Linux kernel's virtual socket implementation.

Bug Bounties: More Hackers Spotting Vulnerabilities Across Web, Mobile, IoT
From ACM TechNews

Bug Bounties: More Hackers Spotting Vulnerabilities Across Web, Mobile, IoT

HackerOne's 2021 Hacker Report reveals a 63% jump in the number of ethical hackers submitting vulnerabilities to bug bounty programs during the last year.

Hackers Exploit Websites to Give Them Excellent SEO Before Deploying Malware
From ACM TechNews

Hackers Exploit Websites to Give Them Excellent SEO Before Deploying Malware

Cybersecurity researchers have found hackers are using search engine optimization to push compromised websites higher up Google's rankings.

Singapore Eyes More Cameras, Technology to Boost Law Enforcement
From ACM TechNews

Singapore Eyes More Cameras, Technology to Boost Law Enforcement

Singapore intends to utilize more cameras and technology to support law enforcement and first responders.

This 'One-Stop Shop' Aims to Create a Roadmap for Security Careers
From ACM TechNews

This 'One-Stop Shop' Aims to Create a Roadmap for Security Careers

The U.K. Cyber Security Council aims to serve as a "one-stop shop" for people seeking careers in information security.

30,000 Macs Infected with New Silver Sparrow Malware
From ACM News

30,000 Macs Infected with New Silver Sparrow Malware

Silver Sparrow can even run on systems with Apple's new M1 chip.

Lygon Blockchain Platform Mints Digital Bank Guarantee
From ACM TechNews

Lygon Blockchain Platform Mints Digital Bank Guarantee

A new blockchain platform named Lygon, formed by Australian banks ANZ, the Commonwealth Bank of Australia, and Westpac, IBM, and shopping center company Scentre...

Blockchain Transactions Confirm Murky, Interconnected Ransomware Scene
From ACM TechNews

Blockchain Transactions Confirm Murky, Interconnected Ransomware Scene

A study by blockchain investigations firm Chainalysis found that cybercrime gangs often switch ransomware-as-a-service suppliers as they seek better profits.

Apple Fixes Another 3 iOS Zero-Days Exploited in the Wild
From ACM TechNews

Apple Fixes Another 3 iOS Zero-Days Exploited in the Wild

Apple has released patches for three iOS zero-day vulnerabilities.

DNSpooq Lets Attackers Poison DNS Cache Records
From ACM TechNews

DNSpooq Lets Attackers Poison DNS Cache Records

Researchers have uncovered seven vulnerabilities that affect Dnsmasq, a domain name system forwarding client for *NIX-based operating systems.

Fake Collaboration Apps Steal Data as Staff Struggle with Home-Working Security
From ACM TechNews

Fake Collaboration Apps Steal Data as Staff Struggle with Home-Working Security

According to cybersecurity company Wandera's Cloud Security Report 2021, malware attacks increasingly targeted remote workers last year.

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys
From ACM TechNews

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys

Researchers at French security company NinjaLab found a vulnerability impacting chips used in Google Titan and YubiKey hardware security keys.

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks
From ACM TechNews

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks

The Defense Digital Service and HackerOne are calling on military and civilian hackers to identify cybersecurity vulnerabilities in the U.S. Army's computer systems...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account