Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectSecurity
authorZDNet

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Academics Hide Humans From Surveillance Cameras With 2D Prints
From ACM TechNews

Academics Hide Humans From Surveillance Cameras With 2D Prints

Researchers have developed a technique of using simple two-dimensional images to render wearers invisible to surveillance cameras.

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk
From ACM TechNews

Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk

Researchers warn of the potential for unregulated aerial drones to threaten citizens.

Study Shows Programmers Will Take the Easy Way Out and Not Implement Proper Password Security
From ACM TechNews

Study Shows Programmers Will Take the Easy Way Out and Not Implement Proper Password Security

Researchers have found that developers tend to write code that stores user passwords in an unsafe manner, because that is easier than creating a more secure product...

Cisco: Patch Routers Now Against Massive 9.8/10-Severity Security Hole
From ACM TechNews

Cisco: Patch Routers Now Against Massive 9.8/10-Severity Security Hole

Cisco has advised enterprise users of its wireless virtual private network and firewall routers to immediately install updates to patch a critical flaw.

Your Bionic Hand Is Now at Risk From Hackers
From ACM TechNews

Your Bionic Hand Is Now at Risk From Hackers

Kaspersky Lab researchers revealed at Mobile World Congress 2019 in Spain that bionic hand prostheses from Moscow-based Motorica are vulnerable to hacking.

Security Flaws Found in 26 Low-End Cryptocurrencies
From ACM TechNews

Security Flaws Found in 26 Low-End Cryptocurrencies

Researchers have discovered two security flaws that impact 26 Proof of Stake cryptocurrencies.

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes
From ACM TechNews

Security Conference Will Let You Hack Tesla Car, Earn Cash Prizes

Security researchers attending the Pwn2Own CanSecWest security conference this March in Vancouver, Canada, will be incentivized to hack a Tesla Model 3 car.

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change
From ACM TechNews

Data Breaches, Cyberattacks Top Global Risks Alongside Natural Disasters, Climate Change

The World Economic Forum has listed large-scale cyberattacks and massive data breaches among the five most probable risks facing the world today.

E­ to Fund Bug Bounty Programs for 14 Open Source Projects
From ACM TechNews

E­ to Fund Bug Bounty Programs for 14 Open Source Projects

The European Union will cover the costs of bug bounty programs for 14 open source projects.

Hyundai Develops Fingerprint Tech to Unlock and Start Cars
From ACM TechNews

Hyundai Develops Fingerprint Tech to Unlock and Start Cars

Hyundai Motor has developed a system that will allow drivers to unlock and start their vehicles using only their fingerprints.

Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption
From ACM TechNews

Flaws in Self-Encrypting SSDs Let Attackers Bypass Disk Encryption

Researchers have found vulnerabilities in some solid-state drives that allow hackers to circumvent encryption and access local data without knowing the password...

Intel CP­s Impacted by New PortSmash Side-Channel Vulnerability
From ACM TechNews

Intel CP­s Impacted by New PortSmash Side-Channel Vulnerability

Researchers discovered a new vulnerability in Intel processors that can allow attackers to leak encrypted data from the internal process of a central processing...

China Has Been "Hijacking the Vital Internet Backbone of Western Countries"
From ACM News

China Has Been "Hijacking the Vital Internet Backbone of Western Countries"

The Chinese government turned to a local ISP for intelligence gathering after it signed the Obama-Xi cyberpact in late 2015, the researchers say.

MIT Invention Builds Memory Walls to Protect Against Meltdown, Spectre Attacks
From ACM TechNews

MIT Invention Builds Memory Walls to Protect Against Meltdown, Spectre Attacks

A new system can more effectively protect modern PC architectures against vulnerabilities exploited by malware like Meltdown and Spectre, researchers say.

What is Cyberwar?
From ACM Opinion

What is Cyberwar?

At its core, cyberwarfare refers the use of digital attacks by one country or nation to disrupt the computer systems of another with the aim of create significant...

Can Graphical Passwords Keep ­s Secure Online?
From ACM TechNews

Can Graphical Passwords Keep ­s Secure Online?

Researchers from the Xi'an Jiaotong-Liverpool University in China have developed an authentication method that uses semantically linked images.

Tech Giants Hit by NSA Spying Slam Encryption Backdoors
From ACM News

Tech Giants Hit by NSA Spying Slam Encryption Backdoors

A coalition of Silicon Valley tech giants has doubled down on its criticism of encryption backdoors following a proposal that would give law enforcement access...

GitHub Hit With the Largest DDoS Attack Ever Seen
From ACM News

GitHub Hit With the Largest DDoS Attack Ever Seen

Distributed Denial of Service attackers have found a new way of magnifying their attacks, with experts warning that bigger attacks are likely.

­niversity of Sydney Develops Quantum Trick to Block Background Sensor 'chatter'
From ACM TechNews

­niversity of Sydney Develops Quantum Trick to Block Background Sensor 'chatter'

Researchers have developed a method to block background "chatter," which they say solves a common problem associated with quantum sensing devices.

Google's AI Can Now Spot Shoulder-Surfers Peeking at Your Screen
From ACM TechNews

Google's AI Can Now Spot Shoulder-Surfers Peeking at Your Screen

Google researchers have developed an "electronic screen protector" application that can immediately spot people glancing at a user's handheld screen.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account