acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectPerformance And Reliability
authorZDNet

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Apple Opens Public Bug Bounty Program, Publishes Rules
From ACM TechNews

Apple Opens Public Bug Bounty Program, Publishes Rules

Apple has formally opened its bug bounty program to all researchers and outlined the program's rules on its website. The maximum available bounty is $1.5 million...

Attackers Using WhatsApp MP4 Video Files Vulnerability Can Remotely Execute Code
From ACM TechNews

Attackers Using WhatsApp MP4 Video Files Vulnerability Can Remotely Execute Code

Facebook has reported a vulnerability in WhatsApp messaging software that allows malefactors to conduct denial-of-service or remote code execution attacks.

World's Fastest Supercomputers Hit Higher Speeds with Linux
From ACM TechNews

World's Fastest Supercomputers Hit Higher Speeds with Linux

The latest Top500 supercomputer ratings found the Oak Ridge National Laboratory's Summit system topping the list with a High-Performance Linpack benchmark of 148...

Canberra Gives AU$32m for Autonomous Decision-Making Research
From ACM TechNews

Canberra Gives AU$32m for Autonomous Decision-Making Research

The Australian government is allocating AU$31.8 million (about US$21.5 million) to the Australian Research Council to study responsible, ethical, and inclusive...

COBOL Turns 60: Why It Will Outlive Us All
From ACM News

COBOL Turns 60: Why It Will Outlive Us All

In the beginning, there was machine languages and assembler. Neither was easy to use, but then along came COBOL, and everything changed.

Mobile Malware Attacks are Booming in 2019: These are the Most Common Threats
From ACM TechNews

Mobile Malware Attacks are Booming in 2019: These are the Most Common Threats

Malware attacks against mobile devices, especially Android handsets, have ballooned this year.

Hackers Breach Greece's Top-Level Domain Registrar
From ACM TechNews

Hackers Breach Greece's Top-Level Domain Registrar

Researchers said Greece's top-level domain registrar has suffered a hacker breach, and identified the state-sponsored "Sea Turtle" hacker group as the perpetrator...

Google's Language Techniques Help O2 Czech Republic Reveal Network Secrets
From ACM TechNews

Google's Language Techniques Help O2 Czech Republic Reveal Network Secrets

Word2vec, a neural network technique developed to understand human languages, also can interpret raw cell tower data.

Petaflop Systems Dominate the Supercomputer Landscape
From ACM TechNews

Petaflop Systems Dominate the Supercomputer Landscape

For the first time, every entry in this year's TOP500 list delivers petaflop-level capabilities.

HSM Vulnerabilities Impact Banks, Cloud Providers, Governments
From ACM TechNews

HSM Vulnerabilities Impact Banks, Cloud Providers, Governments

Researchers have discovered vulnerabilities that can be exploited remotely to retrieve sensitive data stored inside Hardware Security Modules .

Python Predicted to Overtake C and Java in Next 4 Years
From ACM TechNews

Python Predicted to Overtake C and Java in Next 4 Years

Tiobe analysts believe Python probably will become the most popular programming language in the world within three or four years.

Machine Learning Sniffs Out Its Own Machine-Written Propaganda
From ACM TechNews

Machine Learning Sniffs Out Its Own Machine-Written Propaganda

Researchers have modified a neural network to create a natural language processing algorithm that generates, as well as detects, convincing fake articles.

Could TypeScript Replace JavaScript? ­Use of Programming Language Spin-Off Soars
From ACM TechNews

Could TypeScript Replace JavaScript? ­Use of Programming Language Spin-Off Soars

In a recent survey of developers who use npm, 62% of respondents said they used Microsoft's TypeScript to build native mobile and desktop apps, up from 46% in last...

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk
From ACM TechNews

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk

Researchers warn of the potential for unregulated aerial drones to threaten citizens.

­NSW, Sydney ­ni Join Quantum Powers to Prove Qubit Theory
From ACM TechNews

­NSW, Sydney ­ni Join Quantum Powers to Prove Qubit Theory

Researchers in Australia are combining their quantum computing powers, uniting methods designed by researchers at each university to prove their feasibility.

Your Bionic Hand Is Now at Risk From Hackers
From ACM TechNews

Your Bionic Hand Is Now at Risk From Hackers

Kaspersky Lab researchers revealed at Mobile World Congress 2019 in Spain that bionic hand prostheses from Moscow-based Motorica are vulnerable to hacking.

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes
From ACM TechNews

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes

Security researchers attending the Pwn2Own CanSecWest security conference this March in Vancouver, Canada, will be incentivized to hack a Tesla Model 3 car.

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change
From ACM TechNews

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change

The World Economic Forum has listed large-scale cyberattacks and massive data breaches among the five most probable risks facing the world today.

E­ to Fund Bug Bounty Programs for 14 Open Source Projects
From ACM TechNews

E­ to Fund Bug Bounty Programs for 14 Open Source Projects

The European Union will cover the costs of bug bounty programs for 14 open source projects.

Hyundai Develops Fingerprint Tech to Unlock and Start Cars
From ACM TechNews

Hyundai Develops Fingerprint Tech to Unlock and Start Cars

Hyundai Motor has developed a system that will allow drivers to unlock and start their vehicles using only their fingerprints.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account