Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorZDNet

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Microsoft Just Published a Workaround for this Important Windows 10 Flaw
From ACM News

Microsoft Just Published a Workaround for this Important Windows 10 Flaw

Microsoft offers a workaround to a bug that could give attackers the ability to copy an organization's password hashes for offline cracking.

Mozilla Partners with Princeton Researchers for Privacy-Focused Data Sharing Platform on Firefox
From ACM TechNews

Mozilla Partners with Princeton Researchers for Privacy-Focused Data Sharing Platform on Firefox

The Mozilla Web browser's newly-launched Rally data sharing platform is designed to strengthen users' data privacy.

IT Leaders Say Cybersecurity Funding Being Wasted on Remote Work Support: Survey
From ACM TechNews

IT Leaders Say Cybersecurity Funding Being Wasted on Remote Work Support: Survey

In a JumpCloud survey of IT decision-makers at small and medium-sized enterprises, 56% think their organizations are spending too much to enable remote work.

Cyber Insurance Isn't Helping with Cybersecurity
From ACM News

Cyber Insurance Isn't Helping with Cybersecurity

It might be making the ransomware crisis worse, say researchers.

Average Time to Fix Critical Cybersecurity Vulnerabilities is 205 Days: Report
From ACM TechNews

Average Time to Fix Critical Cybersecurity Vulnerabilities is 205 Days: Report

The average time to correct critical cybersecurity vulnerabilities grew from 197 days to 205 days between April and May 2021, according to WhiteHat Security. 

Most Firms Face 2nd Ransomware Attack after Paying Off 1st
From ACM News

Most Firms Face 2nd Ransomware Attack after Paying Off 1st

Some 80% of businesses that pay to regain access to encrypted systems experience a subsequent ransomware attack.

The Global Chip Shortage is Creating a New Problem: More Fake Components
From ACM News

The Global Chip Shortage is Creating a New Problem: More Fake Components

Industry analysts believe that the global chip shortage is creating the perfect environment for counterfeit semiconductors to enter the market.

This Is How Attackers Bypass Microsoft's AMSI Anti-Malware Scanning Protection
From ACM News

This Is How Attackers Bypass Microsoft's AMSI Anti-Malware Scanning Protection

Researchers outline common tactics for circumventing the security software.

An NTSB for Cyber Attacks?
From ACM News

An NTSB for Cyber Attacks?

Critics grapple with Biden's Cybersecurity Safety Review Board plan.

Microsoft Warns: Watch Out for This Malware That Steals Passwords, Webcam, Browser Data
From ACM TechNews

Microsoft Warns: Watch Out for This Malware That Steals Passwords, Webcam, Browser Data

Microsoft has issued a warning over RevengeRAT, a remote access tool that has been used to target aerospace and travel industries with spear-phishing campaigns....

Colonial Pipeline Paid Nearly $5 million in Ransomware Blackmail Payment
From ACM News

Colonial Pipeline Paid Nearly $5 million in Ransomware Blackmail Payment

The payment was reportedly made soon after the attack began. It wasn't enough to stop the disruption.

This One Change Could Protect Your Systems From Attack. So Why Don't More Companies Do It?
From ACM News

This One Change Could Protect Your Systems From Attack. So Why Don't More Companies Do It?

One 'boring but really important' change could improve your security posture significantly. But not everyone does it.

Millions of Older Broadband Routers Have Security Flaws, Warn Researchers
From ACM TechNews

Millions of Older Broadband Routers Have Security Flaws, Warn Researchers

Millions of U.K. households use old broadband routers that hackers could exploit.

This Massive DDoS Attack Took Large Sections of a Country's Internet Offline
From ACM News

This Massive DDoS Attack Took Large Sections of a Country's Internet Offline

More than 200 organizations across Belgium, including the government and parliament, were affected by a DDoS attack that overwhelmed them with bad traffic.

Microsoft Finds Memory Allocation Holes in Range of IoT, Industrial Technology
From ACM TechNews

Microsoft Finds Memory Allocation Holes in Range of IoT, Industrial Technology

A Microsoft security research unit discovered a number of poor memory allocation operations in code used in Internet of Things and operational technology.

Emotet Botnet Harvested 4.3 Million eMail Addresses; FBI Using 'Have I Been Pwned' to Alert the Victims
From ACM News

Emotet Botnet Harvested 4.3 Million eMail Addresses; FBI Using 'Have I Been Pwned' to Alert the Victims

The law enforcement agency is working with the data breach service to alert people that their information may have been harvested by the botnet.

These New Vulnerabilities put Millions of IoT Devices at Risk, so Patch Now
From ACM News

These New Vulnerabilities put Millions of IoT Devices at Risk, so Patch Now

Detailed by researchers at Forescout, the Name:Wreck vulnerabilities could allow attackers to control devices and remotely execute code, act as a gateway to the...

Firmware Attacks Are on the Rise and You Aren't Worrying About Them Enough
From ACM News

Firmware Attacks Are on the Rise and You Aren't Worrying About Them Enough

Businesses are too busy patching to worry about firmware attacks, according to a Microsoft-commissioned study.  

High Severity Linux Network Security Holes Found, Fixed
From ACM TechNews

High Severity Linux Network Security Holes Found, Fixed

Positive Technologies' Alexander Popov detected five high-severity security vulnerabilities in the Linux kernel's virtual socket implementation.

Bug Bounties: More Hackers Spotting Vulnerabilities Across Web, Mobile, IoT
From ACM TechNews

Bug Bounties: More Hackers Spotting Vulnerabilities Across Web, Mobile, IoT

HackerOne's 2021 Hacker Report reveals a 63% jump in the number of ethical hackers submitting vulnerabilities to bug bounty programs during the last year.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account