acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


The Workaday Life of the World's Most Dangerous Ransomware Gang
From ACM News

The Workaday Life of the World's Most Dangerous Ransomware Gang

A Ukrainian researcher leaked 60,000 messages from inside Conti. Here's what they reveal.

Can AI Learn to Forget?
From Communications of the ACM

Can AI Learn to Forget?

Specialized techniques may make it possible to induce selective 'amnesia' in machine learning models.

Technology's Impact on Morality
From Communications of the ACM

Technology's Impact on Morality

Leading technologists and thinkers are concerned about technology's impact on our ethical thinking.

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows
From ACM News

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows

Members of the hacker gang may act in Russia's interest, but their links to the FSB and Cozy Bear hackers appear ad hoc.

New Attack Amplifies DDoSes by 4 Billion-Fold
From ACM TechNews

New Attack Amplifies DDoSes by 4 Billion-Fold

New technique also stretches out distributed denial of service durations to 14 hours.

Twitter Unveils Version of Site That Can Bypass Russia Block
From ACM TechNews

Twitter Unveils Version of Site That Can Bypass Russia Block

Twitter has launched a version of its service that can circumvent Russia's attempts to block and censor the flow of information about its Ukraine invasion.

Encryption Meant to Protect Against Quantum Hackers Is Easily Cracked
From ACM TechNews

Encryption Meant to Protect Against Quantum Hackers Is Easily Cracked

Ward Beullens at IBM Research Zurich in Switzerland easily cracked a cryptography algorithm touted as one of three contenders for a global standard against quantum...

Medical, IoT Devices Vulnerable to Attack
From ACM TechNews

Medical, IoT Devices Vulnerable to Attack

Researchers discovered seven vulnerabilities, known collectively as "Access:7," in more than 150 Internet of Things devices made by more than 100 companies.

Can AI Help Casinos Cut Down on Problem Gambling?
From ACM TechNews

Can AI Help Casinos Cut Down on Problem Gambling?

Researchers are looking to artificial intelligence as a way to potentially identify and predict problem gambling.

War Is Calling Crypto's 'Neutrality' Into Question
From ACM News

War Is Calling Crypto's 'Neutrality' Into Question

War in Ukraine and Western sanctions against Russia have made cryptocurrency a hot potato for international politics.

HP Patches 16 UEFI Firmware Bugs Allowing Stealthy Malware Infections
From ACM TechNews

HP Patches 16 UEFI Firmware Bugs Allowing Stealthy Malware Infections

Researchers at Binarly discovered 16 high-impact UEFI firmware vulnerabilities affecting multiple HP models.

Reality Intrudes on a Utopian Crypto Vision
From ACM News

Reality Intrudes on a Utopian Crypto Vision

The cryptocurrency boom has spawned enterprises democratically governed by a community of users. Or that's the theory. Making it work has been much mess

How Picking Up Your Smartphone Could Reveal Your Identity
From ACM TechNews

How Picking Up Your Smartphone Could Reveal Your Identity

Researchers from Lancaster University and the University of Bath use phone usage time to help identify users

Hackers Find a New Way to Deliver Devastating DDoS Attacks
From ACM News

Hackers Find a New Way to Deliver Devastating DDoS Attacks

Cybercriminals are exploiting a fleet of more than 100,000 misconfigured servers to knock websites offline.

Volunteer Hackers Converge on Ukraine Conflict
From ACM News

Volunteer Hackers Converge on Ukraine Conflict

The online battles have blurred lines between state-backed hackers and patriotic amateurs, making it difficult for governments to understand who is attacking them...

Twitter Wants to Reinvent Itself, by Merging the Old With the New
From ACM News

Twitter Wants to Reinvent Itself, by Merging the Old With the New

The company is undertaking a far-reaching effort to change how it works. For some, it is an echo of their early idealism and a vision for what the Internet could...

Researchers Can Steal Data During Homomorphic Encryption
From ACM TechNews

Researchers Can Steal Data During Homomorphic Encryption

Researchers at North Carolina State University and Turkey's Dokuz Eylul University have cracked next-generation homomorphic encryption via side-channel attacks....

Validating NFTs
From ACM News

Validating NFTs

Ensuring the security of non-fungible tokens.

Millions for Crypto Start-Ups, No Real Names Necessary
From ACM News

Millions for Crypto Start-Ups, No Real Names Necessary

Investors give money to pseudonymous developers. Venture capitalists back founders without learning their real names. What happens when they need to know?

Here Comes the Full Amazonification of Whole Foods
From ACM News

Here Comes the Full Amazonification of Whole Foods

A newly revamped store in Washington shows how thoroughly Amazon has woven itself into the grocery shopping experience.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account