Daniel A. Spielman and colleague Shang-hua Teng solved the mystery of the Simplex Method using a technique called smoothed analysis…
From ACM NewsAllyn Jackson Commissioned by CACM Staff| January 31, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Dutch cybersecurity firm Fox-IT said in a report that a hacker group associated with the Chinese government has been bypassing two-factor authentication (2FA) in...ZDNet From ACM TechNews | January 2, 2020
Among the findings of a Harris Poll survey of 11,000 consumers in 11 countries was that nearly all Brazilians feel companies are not adequately protecting their...ZDNet From ACM TechNews | December 4, 2019
Mozilla has increased payouts for its bug bounty program while adding new websites and services to the list in order to draw more interest from bug hunters.
ZDNet From ACM TechNews | December 2, 2019
The Australian government has issued a draft code of practice for Internet of Things cybersecurity, with a public consultation to run until March 1, 2020.
ZDNet From ACM TechNews | November 25, 2019
Researchers in Germany discovered a new type of Web attack that can compromise content delivery networks into caching and then serving error pages instead of legitimate...ZDNet From ACM TechNews | October 24, 2019
IBM, McAfee, and 16 more firms have launched an effort to address fragmentation and interoperability problems in cybersecurity.
ZDNet From ACM TechNews | October 11, 2019
Scientists at China's OPPO ZIWU Cyber Security Lab, the Chinese University of Hong Kong, and Singapore Management University identified eight flaws in Android's...ZDNet From ACM TechNews | October 8, 2019
Researchers in Germany have developed a new attack that can extract and steal data from encrypted Portable Document Format (PDF) files, sometimes without user...ZDNet From ACM TechNews | October 2, 2019
Researchers have described a new exploit targeting Intel central processing units that support Data-Direct I/O Technology and Remote Direct Memory Access features...ZDNet From ACM TechNews | September 16, 2019
Antivirus maker Avast and the French National Police neutralized the back-end infrastructure of a malware botnet.
ZDNet From ACM TechNews | September 10, 2019
A cybersecurity audit found 21% of 430 U.K. schools had their computers, networks, or servers hacked by students.
ZDNet From ACM TechNews | September 9, 2019
Researchers said Greece's top-level domain registrar has suffered a hacker breach, and identified the state-sponsored "Sea Turtle" hacker group as the perpetrator...ZDNet From ACM TechNews | July 15, 2019
Researchers have discovered vulnerabilities that can be exploited remotely to retrieve sensitive data stored inside Hardware Security Modules .
ZDNet From ACM TechNews | June 18, 2019
Researchers have modified a neural network to create a natural language processing algorithm that generates, as well as detects, convincing fake articles.
ZDNet From ACM TechNews | June 5, 2019
Security researchers have discovered a Linux version of Winnti, a malware used by Chinese government-sponsored hackers.
ZDNet From ACM TechNews | May 22, 2019
Dell laptops and personal computers can be remotely commandeered via a vulnerability in the Dell SupportAssist utility.
ZDNet From ACM TechNews | May 9, 2019
Researchers have developed a technique of using simple two-dimensional images to render wearers invisible to surveillance cameras.
ZDNet From ACM TechNews | April 26, 2019
Researchers have found that developers tend to write code that stores user passwords in an unsafe manner, because that is easier than creating a more secure product...ZDNet From ACM TechNews | March 13, 2019