acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectComputer Systems
authorZDNet
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Robot Delivers the Dough on College Campuses
From ACM TechNews

Robot Delivers the Dough on College Campuses

Delivery robot manufacturer Starship Technologies recently expanded its robot-based food delivery services to two additional campuses.

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys
From ACM TechNews

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys

Researchers at French security company NinjaLab found a vulnerability impacting chips used in Google Titan and YubiKey hardware security keys.

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks
From ACM TechNews

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks

The Defense Digital Service and HackerOne are calling on military and civilian hackers to identify cybersecurity vulnerabilities in the U.S. Army's computer systems...

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector
From ACM TechNews

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector

Cybersecurity firm Check Point found a 45% increase in cyberattacks against the global healthcare sector since November, versus a 22% uptick against all worldwide...

Rediscovering RISC-V: Apple M1 sparks renewed interest in non-x86 architectures
From ACM News

Rediscovering RISC-V: Apple M1 sparks renewed interest in non-x86 architectures

With the runaway success of the new ARM-based M1 Macs, non-x86 architectures are getting their closeup. RISC-V is getting the most attention from system designers...

Cloud Computing Is Grabbing More of Your IT Spending
From ACM TechNews

Cloud Computing Is Grabbing More of Your IT Spending

Cloud-based corporate information technology spending should expand in the coming years, as businesses transition more applications and services, says Gartner. ...

Honeywell Introduces Quantum Computing as a Service with Subscription Offering
From ACM News

Honeywell Introduces Quantum Computing as a Service with Subscription Offering

Each subscriber gets eight or sixteen hours per month of dedicated time with Honeywell scientists to run algorithms on the trapped-ion hardware.

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks
From ACM TechNews

Malware Gang Uses .NET Library to Generate Excel Docs That Bypass Security Checks

Security researchers at NVISO Labs discovered a malware gang is using a .NET library to create malicious Excel files.

The U.K. Is Building Its First Commercial Quantum Computer
From ACM TechNews

The U.K. Is Building Its First Commercial Quantum Computer

U.K. science minister Amanda Solloway says Britain's first commercial quantum computer, supported by government and industry, will be available for use by businesses...

Autonomous Plane Takes Off with Passengers, Cargo
From ACM News

Autonomous Plane Takes Off with Passengers, Cargo

Pilotless planes are here, and the FAA is getting onboard for short-distance regional transportation.  

Elephants vs Trains: AI Helps Ensure They Don't Collide
From ACM TechNews

Elephants vs Trains: AI Helps Ensure They Don't Collide

Researchers have developed a "smart ear" to help prevent fatal collisions involving elephants and trains in India.

Windows 10 2004 Update Block Confusion: 'Your PC Settings Aren't Supported'
From ACM News

Windows 10 2004 Update Block Confusion: 'Your PC Settings Aren't Supported'

Hardware drivers still appear to be causing havoc for users trying to upgrade to Windows 10 version 2004.

GPS Collars for Lions, Cheetahs: How IoT, Open Source Are Protecting Rare Animals
From ACM TechNews

GPS Collars for Lions, Cheetahs: How IoT, Open Source Are Protecting Rare Animals

Smart Parks is testing lightweight GPS collars that can be fitted to lions and cheetahs in Liwonde, Malawi.  

Robots Will Take 50 Million Jobs in the Next Decade. These Are the Skills You'll Need to Stay Employed
From ACM News

Robots Will Take 50 Million Jobs in the Next Decade. These Are the Skills You'll Need to Stay Employed

A new report finds that automation will take over a significant part of work activities in Europe by 2030.

KingMiner Botnet Brute-Forces MSSQL Databases to Install Cryptocurrency Miner
From ACM TechNews

KingMiner Botnet Brute-Forces MSSQL Databases to Install Cryptocurrency Miner

U.K. cybersecurity firm Sophos is advising MSSQL database owners to fortify their servers against botnet-orchestrated brute-force attacks.

Australia's new Quantum-Supercomputing Innovation Hub, CSIRO Roadmap
From ACM TechNews

Australia's new Quantum-Supercomputing Innovation Hub, CSIRO Roadmap

Australia's Pawsey Supercomputing Center and quantum computing startup Quantum Brilliance have announced a quantum-supercomputing innovation hub.

Academics Steal Data From Air-Gapped Systems Using PC Fan Vibrations
From ACM TechNews

Academics Steal Data From Air-Gapped Systems Using PC Fan Vibrations

Academics have developed a technique for stealing data from air-gapped systems by manipulating the vibrations of the fans inside computers.

Crypto-Mining Botnet Has Been Hijacking MSSQL Servers for Almost Two Years
From ACM TechNews

Crypto-Mining Botnet Has Been Hijacking MSSQL Servers for Almost Two Years

A malware botnet has been launching brute-force attacks against Microsoft SQL databases for nearly two years.

Modern RAM Still Vulnerable to Rowhammer Attacks
From ACM TechNews

Modern RAM Still Vulnerable to Rowhammer Attacks

Extensive mitigations deployed during the last six years have failed to eliminate modern random-access memory (RAM) cards' vulnerability to Rowhammer exploits. ...

Apple Opens Public Bug Bounty Program, Publishes Rules
From ACM TechNews

Apple Opens Public Bug Bounty Program, Publishes Rules

Apple has formally opened its bug bounty program to all researchers and outlined the program's rules on its website. The maximum available bounty is $1.5 million...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account