Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


This One Change Could Protect Your Systems From Attack. So Why Don't More Companies Do It?
From ACM News

This One Change Could Protect Your Systems From Attack. So Why Don't More Companies Do It?

One 'boring but really important' change could improve your security posture significantly. But not everyone does it.

96% of U.S. Users Opt Out of App Tracking in iOS 14.5, Analytics Find
From ACM TechNews

96% of U.S. Users Opt Out of App Tracking in iOS 14.5, Analytics Find

U.S. users have opted out of application tracking nearly all of the time following Apple's release of iOS 14.5 in April.

Smart Finger Ring with Integrated RFID Chip
From ACM TechNews

Smart Finger Ring with Integrated RFID Chip

Researchers have developed a three-dimensionally printed smart finger ring that potentially could replace house keys, wallets, health insurance cards, and more....

Election Security: A Scientific View
From ACM News

Election Security: A Scientific View

Barbara Simons and the issues with Internet voting.

Online Cheating Charges Upend Dartmouth Medical School
From ACM News

Online Cheating Charges Upend Dartmouth Medical School

The university accused 17 students of cheating on remote exams, raising questions about data mining and sowing mistrust on campus.

Hacked Pipeline May Stay Shut for Days, Raising Concerns About Fuel Supply
From ACM News

Hacked Pipeline May Stay Shut for Days, Raising Concerns About Fuel Supply

While the impact has been limited so far, some energy analysts warned of possible shortages and higher prices as the suspension continues.

Ransomware Attack Leads to Shutdown of Major U.S. Pipeline System
From ACM News

Ransomware Attack Leads to Shutdown of Major U.S. Pipeline System

The attack on top U.S. operator Colonial Pipeline appears to have been carried out by an Eastern European-based criminal gang.

Fertility Apps Collect, Share Intimate Data Without Users' Knowledge or Permission
From ACM TechNews

Fertility Apps Collect, Share Intimate Data Without Users' Knowledge or Permission

Many top-rated fertility apps collect and share personal information without the knowledge or permission of users, according to a new study.

Millions of Older Broadband Routers Have Security Flaws, Warn Researchers
From ACM TechNews

Millions of Older Broadband Routers Have Security Flaws, Warn Researchers

Millions of U.K. households use old broadband routers that hackers could exploit.

How to Keep Automated Electric Vehicles Safe
From ACM TechNews

How to Keep Automated Electric Vehicles Safe

A study by researchers at the University of Georgia, Kennesaw State University, and Temple University identified cybersecurity weaknesses that could threaten the...

Researchers Develop Protocols to Validate Integrity of ML Models
From ACM TechNews

Researchers Develop Protocols to Validate Integrity of ML Models

Cryptographic algorithms called zero-knowledge proof protocols are a mathematical method that enables the owner of an ML model to generate a succinct proof to demonstrate...

This Massive DDoS Attack Took Large Sections of a Country's Internet Offline
From ACM News

This Massive DDoS Attack Took Large Sections of a Country's Internet Offline

More than 200 organizations across Belgium, including the government and parliament, were affected by a DDoS attack that overwhelmed them with bad traffic.

Microsoft Finds Memory Allocation Holes in Range of IoT, Industrial Technology
From ACM TechNews

Microsoft Finds Memory Allocation Holes in Range of IoT, Industrial Technology

A Microsoft security research unit discovered a number of poor memory allocation operations in code used in Internet of Things and operational technology.

Breakthrough U.S. Army Technology is Game Changer for Deepfake Detection
From ACM TechNews

Breakthrough U.S. Army Technology is Game Changer for Deepfake Detection

Researchers have developed a deepfake detection method for supporting mission-essential tasks.

DOD Isn't Armed to Combat Growing Threat of Info Warfare, Experts Warn
From ACM News

DOD Isn't Armed to Combat Growing Threat of Info Warfare, Experts Warn

Experts will say in today's Congressional testimony that the U.S. can learn from how cyberthreats have evolved in addressing growing online information operations...

France’s Macron Eyes Artificial Intelligence to Monitor Terrorism
From ACM News

France’s Macron Eyes Artificial Intelligence to Monitor Terrorism

The move comes as the French president comes under pressure to crack down on terrorism and Islamist separatism.

Exclusive: Air Force Research Taps Quantum Computing
From ACM News

Exclusive: Air Force Research Taps Quantum Computing

The Air Force plans to partner with quantum computing software company QC Ware to harness its algorithms to better surveil unmanned aircraft.

Justice Department Convenes Task Force to Tackle Wave of Ransomware Attacks
From ACM TechNews

Justice Department Convenes Task Force to Tackle Wave of Ransomware Attacks

The U.S. Department of Justice launched the Ransomware and Digital Extortion Task Force to address the increase in ransomware attacks on critical U.S. organizations...

Viable Plan or Security Theatre? Europe Embraces Digital Health Pass
From ACM TechNews

Viable Plan or Security Theatre? Europe Embraces Digital Health Pass

The EU Commission is expected to award a contract soon for a central system to verify "digital green passes" for those who have been vaccinated against COVID-19...

Cyber-Securing the Home Office
From ACM News

Cyber-Securing the Home Office

Patching the security holes that arise when working from home.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account