acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


'Glowworm Attack' Recovers Audio From Devices' Power LEDs
From ACM TechNews

'Glowworm Attack' Recovers Audio From Devices' Power LEDs

Israeli scientists have demonstrated a novel passive variant of the TEMPEST exploit called Glowworm, which can extract electronic conversations by analyzing devices'...

U.S. Prisons Mull AI to Analyze Inmate Phone Calls
From ACM TechNews

U.S. Prisons Mull AI to Analyze Inmate Phone Calls

The U.S. House Appropriations Committee has asked for a report on using artificial intelligence to analyze prison inmates' phone calls to help prevent violent crime...

Messaging Apps Have an Eavesdropping Problem
From ACM TechNews

Messaging Apps Have an Eavesdropping Problem

Google's Project Zero researcher Natalie Silvanovich found vulnerabilities in messaging apps that add eavesdropping bugs without requiring users to click a malicious...

Novel ASIC Implements Post-Quantum Cryptography
From ACM TechNews

Novel ASIC Implements Post-Quantum Cryptography

Chip efficiently implements post-quantum cryptography to better protect against future hacker attacks using quantum computers

Security Flaws Found in Popular EV Chargers
From ACM TechNews

Security Flaws Found in Popular EV Chargers

Analysts have identified flaws in the application programming interfaces of six home electric vehicle (EV) charging brands, as well as the Chargepoint public EV...

Apple is Prying into iPhones to Find Sexual Predators
From ACM News

Apple is Prying into iPhones to Find Sexual Predators

Privacy activists worry governments could weaponize the feature.

U.S. Taps Tech Giants to Help Fight Ransomware, Cyberattacks
From ACM News

U.S. Taps Tech Giants to Help Fight Ransomware, Cyberattacks

The Department of Homeland Security enlists Amazon, Microsoft, Google and others to help combat cyberthreats.

Microsoft Warns Over Unusual Malware That Targets Windows, Linux
From ACM TechNews

Microsoft Warns Over Unusual Malware That Targets Windows, Linux

Microsoft security researchers are warning customers about the LemonDuck crypto-mining malware that attacks Windows and Linux systems.

Oregon Examines Spyware Investment amid Controversy
From ACM News

Oregon Examines Spyware Investment amid Controversy

The Oregon state employee pension fund is one of the largest investors, if not the largest, in a private equity firm that has majority ownership of NSO Group, the...

Do You Hear What I Hear? A Cyberattack.
From ACM TechNews

Do You Hear What I Hear? A Cyberattack.

Carnegie Mellon University researchers have designed a method of making abnormal network traffic audible by rendering cybersecurity data musically.

$49 Malware Receives Major Upgrade to Strike Windows, macOS PCs
From ACM TechNews

$49 Malware Receives Major Upgrade to Strike Windows, macOS PCs

Researchers at Check Point Research said the Windows-based malware variant known as Formbook has been upgraded to infiltrate Mac computers.

Cyber Risk in Digital Transformation
From ACM News

Cyber Risk in Digital Transformation

Cybersecurity missteps during corporate Digital Transformation efforts can lead to digital breaches.

EU Fines Amazon Record $888 Million Over Data Violations
From ACM TechNews

EU Fines Amazon Record $888 Million Over Data Violations

Luxembourg's CNPD data protection authority fined Amazon a record $888 million for breaching the EU's General Data Protection Regulation (GDPR).

Honeypot Security Technique Can Stop Attacks in Natural Language Processing
From ACM TechNews

Honeypot Security Technique Can Stop Attacks in Natural Language Processing

A machine learning framework can proactively counter universal trigger attacksi n natural language processing applications.

Cybersecurity Technique Keeps Hackers Guessing
From ACM TechNews

Cybersecurity Technique Keeps Hackers Guessing

Development Command's Army Research Laboratory ]has designed a machine learning-based framework to augment the security of in-vehicle computer networks.

Hackers Used Never-Before-Seen Wiper in Attack on Iranian Train System
From ACM News

Hackers Used Never-Before-Seen Wiper in Attack on Iranian Train System

SentinelOne analysts were able to recreate the July 9 attack and identify the threat actor behind it.

White House Pushes for Stronger Critical Infrastructure Security
From ACM News

White House Pushes for Stronger Critical Infrastructure Security

Securing critical infrastructure requires a "whole-of-nation" effort, government official says.

 Controversial Tool Calls Out Thousands of Hackable Websites
From ACM News

Controversial Tool Calls Out Thousands of Hackable Websites

PunkSpider is back, and crawling hundreds of millions of sites for vulnerabilities.

Hackers Turning to 'Exotic' Programming Languages for Malware Development
From ACM News

Hackers Turning to 'Exotic' Programming Languages for Malware Development

For example, earlier this year, enterprise security firm Proofpoint discovered new malware written in Nim and Rust.

Detecting Deception
From ACM News

Detecting Deception

Advanced machine learning algorithms can spot lying even better than a polygraph.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account