Israeli scientists have demonstrated a novel passive variant of the TEMPEST exploit called Glowworm, which can extract electronic conversations by analyzing devices'...Ars Technica From ACM TechNews | August 11, 2021
The U.S. House Appropriations Committee has asked for a report on using artificial intelligence to analyze prison inmates' phone calls to help prevent violent crime...Reuters From ACM TechNews | August 11, 2021
Google's Project Zero researcher Natalie Silvanovich found vulnerabilities in messaging apps that add eavesdropping bugs without requiring users to click a malicious...Wired From ACM TechNews | August 10, 2021
Analysts have identified flaws in the application programming interfaces of six home electric vehicle (EV) charging brands, as well as the Chargepoint public EV...TechCrunch From ACM TechNews | August 6, 2021
The Oregon state employee pension fund is one of the largest investors, if not the largest, in a private equity firm that has majority ownership of NSO Group, the...The Washington Post From ACM News | August 5, 2021
Carnegie Mellon University researchers have designed a method of making abnormal network traffic audible by rendering cybersecurity data musically.
Carnegie Mellon University CyLab Security and Privacy Institute From ACM TechNews | August 4, 2021
Development Command's Army Research Laboratory ]has designed a machine learning-based framework to augment the security of in-vehicle computer networks.
U.S. Army DEVCOM Army Research Laboratory From ACM TechNews | July 30, 2021