Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


'Zoombombing' Research Shows Legitimate Meeting Attendees Cause Most Attacks
From ACM TechNews

'Zoombombing' Research Shows Legitimate Meeting Attendees Cause Most Attacks

A study by researchers at Binghamton and Boston universities indicates most zoombombing attacks are caused by legitimate attendees.

Tracking the Hackers
From ACM News

Tracking the Hackers

Dissecting the SolarWinds hack.

Blockchain Transactions Confirm Murky, Interconnected Ransomware Scene
From ACM TechNews

Blockchain Transactions Confirm Murky, Interconnected Ransomware Scene

A study by blockchain investigations firm Chainalysis found that cybercrime gangs often switch ransomware-as-a-service suppliers as they seek better profits.

Scientists Develop Method to Detect Fake News
From ACM TechNews

Scientists Develop Method to Detect Fake News

Researchers used machine learning to develop a method for identifying fake news even when such reports are repeatedly adapted.

How the United States Lost to Hackers
From ACM News

How the United States Lost to Hackers

America's biggest vulnerability in cyberwarfare is hubris.

Here's a Way to Learn If Facial Recognition Systems Used Your Photos
From ACM TechNews

Here's a Way to Learn If Facial Recognition Systems Used Your Photos

The Exposing.AI online tool lets people search image collections for photos of themselves, to learn if such images were used to train facial recognition systems...

Apple Fixes Another 3 iOS Zero-Days Exploited in the Wild
From ACM TechNews

Apple Fixes Another 3 iOS Zero-Days Exploited in the Wild

Apple has released patches for three iOS zero-day vulnerabilities.

The Scramble for Post-Quantum Cryptography
From ACM News

The Scramble for Post-Quantum Cryptography

Quantum computers are expected to undermine today's computer security.

Clearview AI’s Facial Recognition App Called Illegal in Canada
From ACM News

Clearview AI’s Facial Recognition App Called Illegal in Canada

Canadian authorities declared that the company needed citizens' consent to use their biometric information, and told the firm to delete facial images from its database...

High-Performance Computers Under Siege by Newly Discovered Backdoor
From ACM TechNews

High-Performance Computers Under Siege by Newly Discovered Backdoor

Researchers at Slovak security firm Eset said a newly discovered backdoor allows hackers to remotely execute arbitrary commands on some high-performance computer...

Google Says It's Too Easy for Hackers to Find New Security Flaws
From ACM News

Google Says It's Too Easy for Hackers to Find New Security Flaws

Attackers are exploiting the same types of software vulnerabilities over and over again, because companies often miss the forest for the trees

Google Pursues Plan to Remove Third-Party Cookies
From ACM TechNews

Google Pursues Plan to Remove Third-Party Cookies

Google is moving ahead with a plan to strip third-party cookies from its Chrome Web browser and replace them with privacy-friendly alternatives.

Quantum Computing Scientists Call for Ethical Guidelines
From ACM TechNews

Quantum Computing Scientists Call for Ethical Guidelines

Six quantum computing experts are raising ethical issues about the technology's potential to create new weapons and ramp up human genetic manipulation.

Researchers Propose Porcupine, a Compiler for Homomorphic Encryption
From ACM TechNews

Researchers Propose Porcupine, a Compiler for Homomorphic Encryption

A synthesizing compiler for homomorphic encryption can translate a plain-text unencrypted codebase into encrypted code on the fly.

When a Story is Breaking, AI Can Help Consumers Identify Fake News
From ACM TechNews

When a Story is Breaking, AI Can Help Consumers Identify Fake News

Rensselaer Polytechnic Institute researchers have determined that artificial intelligence can help assess news stories accurately, but only when a story is first...

Women Primed to Fill Cybersecurity Talent Gap
From ACM TechNews

Women Primed to Fill Cybersecurity Talent Gap

Cybersecurity analysts are in great demand thanks to the surge in remote work due to the pandemic; hiring more women can help narrow the talent gap.

DNSpooq Lets Attackers Poison DNS Cache Records
From ACM TechNews

DNSpooq Lets Attackers Poison DNS Cache Records

Researchers have uncovered seven vulnerabilities that affect Dnsmasq, a domain name system forwarding client for *NIX-based operating systems.

Moore's Law: What Comes Next?
From Communications of the ACM

Moore's Law: What Comes Next?

Moore's Law challenges point to changes in software.

The State of Virtual Reality Hardware
From Communications of the ACM

The State of Virtual Reality Hardware

Advances in VR hardware could finally take the technology mainstream.

Technological Responses to COVID-19
From Communications of the ACM

Technological Responses to COVID-19

Companies are finding new ways to enforce social distancing, clean public spaces, and provide substitutes for human workers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account