Amazon subsidiary and Internet-connected doorbell maker Ring said police departments must make future requests for home security video from its doorbells and cameras...Bloomberg From ACM TechNews | June 7, 2021
Shadow Figment technology is designed to contain cyberattacks by luring hackers into artificial environments and feeding them false indicators of success.
Pacific Northwest National Laboratory From ACM TechNews | June 7, 2021
The Twitter Trends platform's algorithm for identifying and alerting Twitter users to popular hashtag-fueled topics is vulnerable to mass-scale manipulation, researchers...EPFL News (Switzerland) From ACM TechNews | June 4, 2021
Researchers at Spain's Institute of Photonic Sciences have taken a step toward a secure quantum Internet by using crystals to execute quantum teleportation of information...New Scientist From ACM TechNews | June 4, 2021
CodeShield software can detect and patch security bugs in cloud applications by automatically analyzing vulnerabilities in the program code.
Fraunhofer-Gesellschaft (Germany) From ACM TechNews | June 3, 2021
Meat processing plants operated by JBS, which handles a fifth of the cattle and hog slaughter in the U.S., were coming back online on Wednesday but were not all...The New York Times From ACM News | June 3, 2021
Hackers with suspected ties to China penetrated the New York transit agency's computer systems in April, an M.T.A. document shows. Transit officials say the intrusion...The New York Times From ACM News | June 3, 2021