acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectManagement
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


This One Change Could Protect Your Systems From Attack. So Why Don't More Companies Do It?
From ACM News

This One Change Could Protect Your Systems From Attack. So Why Don't More Companies Do It?

One 'boring but really important' change could improve your security posture significantly. But not everyone does it.

Millions of Older Broadband Routers Have Security Flaws, Warn Researchers
From ACM TechNews

Millions of Older Broadband Routers Have Security Flaws, Warn Researchers

Millions of U.K. households use old broadband routers that hackers could exploit.

Microsoft Finds Memory Allocation Holes in Range of IoT, Industrial Technology
From ACM TechNews

Microsoft Finds Memory Allocation Holes in Range of IoT, Industrial Technology

A Microsoft security research unit discovered a number of poor memory allocation operations in code used in Internet of Things and operational technology.

Emotet Botnet Harvested 4.3 Million eMail Addresses; FBI Using 'Have I Been Pwned' to Alert the Victims
From ACM News

Emotet Botnet Harvested 4.3 Million eMail Addresses; FBI Using 'Have I Been Pwned' to Alert the Victims

The law enforcement agency is working with the data breach service to alert people that their information may have been harvested by the botnet.

Brazilian Government Launches Toolkit to Support Data Protection Compliance
From ACM TechNews

Brazilian Government Launches Toolkit to Support Data Protection Compliance

Brazil's Digital Government Secretariat has rolled out a toolkit to facilitate central government agencies' compliance with the General Data Protection Regulation...

These New Vulnerabilities put Millions of IoT Devices at Risk, so Patch Now
From ACM News

These New Vulnerabilities put Millions of IoT Devices at Risk, so Patch Now

Detailed by researchers at Forescout, the Name:Wreck vulnerabilities could allow attackers to control devices and remotely execute code, act as a gateway to the...

This Old Programming Language is Suddenly Getting More Popular Again
From ACM News

This Old Programming Language is Suddenly Getting More Popular Again

Apple's Objective-C finally exits the top 20 list of popular programming languages tracked by Tiobe, but a 'dinosaur' language has had an unexpected boost.

Firmware Attacks Are on the Rise and You Aren't Worrying About Them Enough
From ACM News

Firmware Attacks Are on the Rise and You Aren't Worrying About Them Enough

Businesses are too busy patching to worry about firmware attacks, according to a Microsoft-commissioned study.  

Fewer Troops, but More Tech: U.K. Military Downsizes as it Shifts to AI, Drones, Cyber
From ACM News

Fewer Troops, but More Tech: U.K. Military Downsizes as it Shifts to AI, Drones, Cyber

New defense plans for the next decade come with a strong focus on new technologies, pitching leaner but more effective armed forces.

This Powerful Supercomputer Was Built in Just 20 Weeks, With a Bit of Help From a Tiny Robot
From ACM TechNews

This Powerful Supercomputer Was Built in Just 20 Weeks, With a Bit of Help From a Tiny Robot

The Cambridge-1 supercomputer has entered its first stages of operation just 20 weeks after it was first announced.

Technology Will Create Millions of Jobs. The Problem Will Be to Find Workers to Fill Them
From ACM TechNews

Technology Will Create Millions of Jobs. The Problem Will Be to Find Workers to Fill Them

A new economic analysis indicates that new technologies will create tens of millions of jobs by 2030, but are unlikely to offset job losses from automation.

High Severity Linux Network Security Holes Found, Fixed
From ACM TechNews

High Severity Linux Network Security Holes Found, Fixed

Positive Technologies' Alexander Popov detected five high-severity security vulnerabilities in the Linux kernel's virtual socket implementation.

Bug Bounties: More Hackers Spotting Vulnerabilities Across Web, Mobile, IoT
From ACM TechNews

Bug Bounties: More Hackers Spotting Vulnerabilities Across Web, Mobile, IoT

HackerOne's 2021 Hacker Report reveals a 63% jump in the number of ethical hackers submitting vulnerabilities to bug bounty programs during the last year.

Way Beyond AlphaZero: Berkeley, Google Work Shows Robotics May Be Deepest Machine Learning of All
From ACM TechNews

Way Beyond AlphaZero: Berkeley, Google Work Shows Robotics May Be Deepest Machine Learning of All

A new report found that the hardest and perhaps most promising work of deep learning may lie in the realm of robotics,

Developers: This Is the One Skill Most Likely to Get You Hired, According to IBM
From ACM TechNews

Developers: This Is the One Skill Most Likely to Get You Hired, According to IBM

New IBM research revealed that developers with skills in creating open-source cloud technologies are more likely than other job candidates to receive a call-back...

30,000 Macs Infected with New Silver Sparrow Malware
From ACM News

30,000 Macs Infected with New Silver Sparrow Malware

Silver Sparrow can even run on systems with Apple's new M1 chip.

Apple CEO Sounds Warning of Algorithms Pushing Society Towards Catastrophe
From ACM News

Apple CEO Sounds Warning of Algorithms Pushing Society Towards Catastrophe

Tim Cook says there will be consequences to having 'rampant disinformation and conspiracy theories juiced by algorithms'.

AI Set to Replace Humans in Cybersecurity by 2030, Says Trend Micro Survey
From ACM TechNews

AI Set to Replace Humans in Cybersecurity by 2030, Says Trend Micro Survey

In a survey of information technology leaders, 41% of respondents expect artificial intelligence to take over their roles by 2030.

How 3D Printing Is Helping CERN Scientists Upgrade the World's Largest Machine
From ACM TechNews

How 3D Printing Is Helping CERN Scientists Upgrade the World's Largest Machine

Scientists at the European Organization for Nuclear Research have spent the past five years working to upgrade to the large hadron collider, the largest particle...

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys
From ACM TechNews

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys

Researchers at French security company NinjaLab found a vulnerability impacting chips used in Google Titan and YubiKey hardware security keys.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account