acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectComputers And Society
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


A Quantum Computer Just Solved a Decades-Old Problem Three Million Times Faster Than a Classical Computer
From ACM TechNews

A Quantum Computer Just Solved a Decades-Old Problem Three Million Times Faster Than a Classical Computer

Researchers simulated some materials as much as 3 million times faster than a classical computer could through the process of quantum annealing.

Developers: This Is the One Skill Most Likely to Get You Hired, According to IBM
From ACM TechNews

Developers: This Is the One Skill Most Likely to Get You Hired, According to IBM

New IBM research revealed that developers with skills in creating open-source cloud technologies are more likely than other job candidates to receive a call-back...

30,000 Macs Infected with New Silver Sparrow Malware
From ACM News

30,000 Macs Infected with New Silver Sparrow Malware

Silver Sparrow can even run on systems with Apple's new M1 chip.

To Infinity and Beyond: Linux, Open Source Go to Mars
From ACM TechNews

To Infinity and Beyond: Linux, Open Source Go to Mars

The Perseverance rover will explore Mars with the self-flying Ingenuity helicopter drone, using Linux and NASA-built software.

Robot Satellite Swarms Increase Communication Possibilities
From ACM TechNews

Robot Satellite Swarms Increase Communication Possibilities

A space mission currently underway aims to maximize the effectiveness of CubeSats by showing how they could track and communicate with each other.

Blockchain Transactions Confirm Murky, Interconnected Ransomware Scene
From ACM TechNews

Blockchain Transactions Confirm Murky, Interconnected Ransomware Scene

A study by blockchain investigations firm Chainalysis found that cybercrime gangs often switch ransomware-as-a-service suppliers as they seek better profits.

Apple Fixes Another 3 iOS Zero-Days Exploited in the Wild
From ACM TechNews

Apple Fixes Another 3 iOS Zero-Days Exploited in the Wild

Apple has released patches for three iOS zero-day vulnerabilities.

Robot Delivers the Dough on College Campuses
From ACM TechNews

Robot Delivers the Dough on College Campuses

Delivery robot manufacturer Starship Technologies recently expanded its robot-based food delivery services to two additional campuses.

Apple CEO Sounds Warning of Algorithms Pushing Society Towards Catastrophe
From ACM News

Apple CEO Sounds Warning of Algorithms Pushing Society Towards Catastrophe

Tim Cook says there will be consequences to having 'rampant disinformation and conspiracy theories juiced by algorithms'.

AI Set to Replace Humans in Cybersecurity by 2030, Says Trend Micro Survey
From ACM TechNews

AI Set to Replace Humans in Cybersecurity by 2030, Says Trend Micro Survey

In a survey of information technology leaders, 41% of respondents expect artificial intelligence to take over their roles by 2030.

DNSpooq Lets Attackers Poison DNS Cache Records
From ACM TechNews

DNSpooq Lets Attackers Poison DNS Cache Records

Researchers have uncovered seven vulnerabilities that affect Dnsmasq, a domain name system forwarding client for *NIX-based operating systems.

Fake Collaboration Apps Steal Data as Staff Struggle with Home-Working Security
From ACM TechNews

Fake Collaboration Apps Steal Data as Staff Struggle with Home-Working Security

According to cybersecurity company Wandera's Cloud Security Report 2021, malware attacks increasingly targeted remote workers last year.

How 3D Printing Is Helping CERN Scientists Upgrade the World's Largest Machine
From ACM TechNews

How 3D Printing Is Helping CERN Scientists Upgrade the World's Largest Machine

Scientists at the European Organization for Nuclear Research have spent the past five years working to upgrade to the large hadron collider, the largest particle...

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys
From ACM TechNews

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys

Researchers at French security company NinjaLab found a vulnerability impacting chips used in Google Titan and YubiKey hardware security keys.

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks
From ACM TechNews

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks

The Defense Digital Service and HackerOne are calling on military and civilian hackers to identify cybersecurity vulnerabilities in the U.S. Army's computer systems...

Programming Languages: Python Rules While Java Dips
From ACM TechNews

Programming Languages: Python Rules While Java Dips

Software-quality tracking company Tiobe named Python 2020's top programming language because its popularity outgrew that of all other languages in its index last...

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector
From ACM TechNews

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector

Cybersecurity firm Check Point found a 45% increase in cyberattacks against the global healthcare sector since November, versus a 22% uptick against all worldwide...

Rediscovering RISC-V: Apple M1 sparks renewed interest in non-x86 architectures
From ACM News

Rediscovering RISC-V: Apple M1 sparks renewed interest in non-x86 architectures

With the runaway success of the new ARM-based M1 Macs, non-x86 architectures are getting their closeup. RISC-V is getting the most attention from system designers...

Nissan Source Code Leaked Online After Git Repo Misconfiguration
From ACM TechNews

Nissan Source Code Leaked Online After Git Repo Misconfiguration

Software engineer Tillie Kottmann said Nissan North America's misconfiguration of a Bitbucket Git server led to the online leakage of the automaker’s source code...

Malware Uses WiFi BSSID for Victim Identification
From ACM TechNews

Malware Uses WiFi BSSID for Victim Identification

A newly discovered malware strain collects an infected user's Basic Service Set Identifier, in order to ascertain the location of the user and their Wi-Fi access...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account