A new study finds that while many businesses successfully switched to telecommuting overnight, some serious fine-tuning is needed if WFH is to become permanent....ZDNet From ACM News | July 27, 2020
Consumer rights groups say the agency operating the subway system in São Paulo, Brazil, has not shown that a new facial recognition technology platform protects...ZDNet From ACM TechNews | July 7, 2020
Researchers discovered a new variant of a powerful cryptojacking and DDoS-based malware, called Lucifer, which infects Windows machines by exploiting their vulnerabilities...ZDNet From ACM TechNews | July 1, 2020
Since the Australian government announced it would fast-track digital alternatives to in-person medical care, a million mental health telehealth consultations have...ZDNet From ACM TechNews | May 7, 2020
Nearly half of 256 cybersecurity professionals polled reported having been reassigned to general IT tasks, due to the global COVID-19 outbreak.
ZDNet From ACM TechNews | May 4, 2020
Danish researchers reported a security vulnerability affecting cable modems that use Broadcom chips, which is believed to impact about 200 million cable modems...ZDNet From ACM TechNews | January 13, 2020
Apple has formally opened its bug bounty program to all researchers and outlined the program's rules on its website. The maximum available bounty is $1.5 million...ZDNet From ACM TechNews | December 27, 2019
Facebook has reported a vulnerability in WhatsApp messaging software that allows malefactors to conduct denial-of-service or remote code execution attacks.
ZDNet From ACM TechNews | December 3, 2019
The latest Top500 supercomputer ratings found the Oak Ridge National Laboratory's Summit system topping the list with a High-Performance Linpack benchmark of 148...ZDNet From ACM TechNews | November 20, 2019
The Australian government is allocating AU$31.8 million (about US$21.5 million) to the Australian Research Council to study responsible, ethical, and inclusive...ZDNet From ACM TechNews | October 15, 2019
In the beginning, there was machine languages and assembler. Neither was easy to use, but then along came COBOL, and everything changed.
ZDNet From ACM News | September 9, 2019
Researchers said Greece's top-level domain registrar has suffered a hacker breach, and identified the state-sponsored "Sea Turtle" hacker group as the perpetrator...ZDNet From ACM TechNews | July 15, 2019
Word2vec, a neural network technique developed to understand human languages, also can interpret raw cell tower data.
ZDNet From ACM TechNews | June 20, 2019
Researchers have discovered vulnerabilities that can be exploited remotely to retrieve sensitive data stored inside Hardware Security Modules .
ZDNet From ACM TechNews | June 18, 2019