acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
dateMore Than a Year Ago
subjectSecurity
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys
From ACM TechNews

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys

Researchers at French security company NinjaLab found a vulnerability impacting chips used in Google Titan and YubiKey hardware security keys.

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks
From ACM TechNews

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks

The Defense Digital Service and HackerOne are calling on military and civilian hackers to identify cybersecurity vulnerabilities in the U.S. Army's computer systems...

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector
From ACM TechNews

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector

Cybersecurity firm Check Point found a 45% increase in cyberattacks against the global healthcare sector since November, versus a 22% uptick against all worldwide...

Nissan Source Code Leaked Online After Git Repo Misconfiguration
From ACM TechNews

Nissan Source Code Leaked Online After Git Repo Misconfiguration

Software engineer Tillie Kottmann said Nissan North America's misconfiguration of a Bitbucket Git server led to the online leakage of the automaker’s source code...

Malware Uses WiFi BSSID for Victim Identification
From ACM TechNews

Malware Uses WiFi BSSID for Victim Identification

A newly discovered malware strain collects an infected user's Basic Service Set Identifier, in order to ascertain the location of the user and their Wi-Fi access...

Farmers Get Their Own Security Advice as Cyberattacks Increase
From ACM TechNews

Farmers Get Their Own Security Advice as Cyberattacks Increase

The U.K.'s National Cyber Security Center has published guidance for farmers to help guard against cyberattacks.

Ransomware vs WFH: How Remote Working is Making Cyberattacks Easier to Pull Off
From ACM News

Ransomware vs WFH: How Remote Working is Making Cyberattacks Easier to Pull Off

This year has forced organizations to adapt quickly to enabling employees to work from home. That's creating 'chaos with no control' - which cyber criminals are...

Singapore Tightens Security Requirements for Home Routers
From ACM TechNews

Singapore Tightens Security Requirements for Home Routers

Beginning next April, home Wi-Fi routers sold in Singapore must meet new security requirements.

4G, 5G Networks Could Be Vulnerable to Exploit Due to 'Mishmash' of Old Technologies
From ACM TechNews

4G, 5G Networks Could Be Vulnerable to Exploit Due to 'Mishmash' of Old Technologies

Positive Technologies' Sergey Puzankov said that outstanding issues in the Signaling System 7  protocol continue to plague the telecommunications industry as it...

Australia's Report on Agtech Confirms Technology Can Lead to Fertile Future
From ACM TechNews

Australia's Report on Agtech Confirms Technology Can Lead to Fertile Future

A new report says emerging technologies could enhance the productivity, diversity, and profitability of Australia's agricultural sector.

This Is How Much Top Hackers Are Earning From Bug Bounties
From ACM TechNews

This Is How Much Top Hackers Are Earning From Bug Bounties

More than $44.75 million in bounties was awarded to hackers worldwide over the past year, up 86% year-on-year, according to HackerOne.

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs
From ACM TechNews

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs

An advisory from the Cybersecurity and Infrastructure Security Agency (CISA) warns of attacks against U.S. federal networks by hacker groups associated with China's...

Most Cybersecurity Reports Only Focus on the Cool Threats
From ACM TechNews

Most Cybersecurity Reports Only Focus on the Cool Threats

A study found just 82 of 629 commercial cybersecurity reports published in the last decade discuss threats to civil society, with the rest devoted to cybercrime...

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug
From ACM TechNews

Millions of WordPress Sites Are Being Probed, Attacked With Recent Plugin Bug

Defiant Inc. reports millions of WordPress sites have been attacked by hackers exploiting a zero-day vulnerability in the "File Manager" WordPress plugin.

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks
From ACM TechNews

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks

Security researchers at NVISO Labs discovered a malware gang is using a .NET library to create malicious Excel files.

Microsoft Pays $13.7 Million in Security Bug Bounties
From ACM TechNews

Microsoft Pays $13.7 Million in Security Bug Bounties

Microsoft has awarded $13.7 million to security researchers since July 2019 for reporting bugs in its software, which is triple the $4.4 million from the same period...

Evil AI: These are the 20 Most Dangerous Crimes that Artificial Intelligence will Create
From ACM News

Evil AI: These are the 20 Most Dangerous Crimes that Artificial Intelligence will Create

A new report tells us which criminal applications of AI we should really worry about.

BadPower Attack Corrupts Fast Chargers to Melt or Set Your Device on Fire
From ACM TechNews

BadPower Attack Corrupts Fast Chargers to Melt or Set Your Device on Fire

Chinese security researchers from Tencent's Xuanwu Lab said they can corrupt the firmware of fast chargers to cause damage to the items they charge. The BadPower...

Phishing Attacks: This Sophisticated Group Has Been Operating Undiscovered for at Least a Year
From ACM TechNews

Phishing Attacks: This Sophisticated Group Has Been Operating Undiscovered for at Least a Year

Cybersecurity researchers found a new phishing group targeting large companies worldwide, which may have been operating undiscovered for over a year.

São Paulo Subway Facial Recognition System Slammed Over User Data Security, Privacy
From ACM TechNews

São Paulo Subway Facial Recognition System Slammed Over User Data Security, Privacy

Consumer rights groups say the agency operating the subway system in São Paulo, Brazil, has not shown that a new facial recognition technology platform protects...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account