Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Critical Flaws Discovered in Popular Industrial Remote Access Systems
From ACM TechNews

Critical Flaws Discovered in Popular Industrial Remote Access Systems

Researchers found critical defects in two popular industrial remote access systems that attackers could exploit.

Hacker Releases Information on Las Vegas-Area Students After Officials Don't Pay Ransom
From ACM TechNews

Hacker Releases Information on Las Vegas-Area Students After Officials Don't Pay Ransom

A hacker who locked computer servers in Las Vegas' Clark County School District with ransomware released documents with stolen private data after officials refused...

One of This Year's Most Severe Windows Bugs Is Now Under Active Exploit
From ACM TechNews

One of This Year's Most Severe Windows Bugs Is Now Under Active Exploit

Microsoft warns a high-impact vulnerability that allows hackers to instantly take control of Windows' Active Directory is being actively exploited by malicious...

Hackers Infiltrated Many Washington State Agencies
From ACM TechNews

Hackers Infiltrated Many Washington State Agencies

At least 13 of Washington State's departments and commissions reportedly have been hit by a sophisticated malware attack.

Login Glitch Behind Tokyo Stock Exchange Snafu
From ACM News

Login Glitch Behind Tokyo Stock Exchange Snafu

High-frequency trader connecting via Merrill Lynch apparently unleashed data flood.

3D Biometric Authentication Based on Finger Veins Almost Impossible to Fool
From ACM TechNews

3D Biometric Authentication Based on Finger Veins Almost Impossible to Fool

Researchers have developed a three-dimensional biometric authentication methodology based on the veins in  one's fingers.

Error Discovered on Georgia Touchscreens in U.S. Senate Race
From ACM TechNews

Error Discovered on Georgia Touchscreens in U.S. Senate Race

Georgia election officials say they found a programming error on the state's voting touchscreens that caused a column of candidates in the U.S. Senate special election...

This Is How Much Top Hackers Are Earning From Bug Bounties
From ACM TechNews

This Is How Much Top Hackers Are Earning From Bug Bounties

More than $44.75 million in bounties was awarded to hackers worldwide over the past year, up 86% year-on-year, according to HackerOne.

Hacker Accessed Network of U.S. Agency, Downloaded Data
From ACM TechNews

Hacker Accessed Network of U.S. Agency, Downloaded Data

The U.S. Cybersecurity & Infrastructure Security Agency says an unnamed federal agency has been the victim of a cyberattack in which a hacker accessed its network...

Windows Exploit Lets You Instantly Become Admin. Have You Patched?
From ACM TechNews

Windows Exploit Lets You Instantly Become Admin. Have You Patched?

Zerologon lets anyone with a network toehold obtain the domain-controller password.

Cyber Threat to Disrupt Start of U.K. University Term
From ACM TechNews

Cyber Threat to Disrupt Start of U.K. University Term

The U.K.'s National Cyber Security Center is warning colleges and universities that increasing numbers of cyberattacks threaten to disrupt the start of the Fall...

Bouncing Balls and Quantum Computing
From Communications of the ACM

Bouncing Balls and Quantum Computing

A lighthearted method for calculating π is analogous to a fundamental algorithm for quantum computing.

Thwarting Side-Channel Attacks
From Communications of the ACM

Thwarting Side-Channel Attacks

Deep learning challenges chip security.

Who Has Access to Your Smartphone Data?
From Communications of the ACM

Who Has Access to Your Smartphone Data?

ISPs, app developers, and even the government may know more about you than you think.

Fran Allen
From Communications of the ACM

Fran Allen: 1932-2020

Frances E. Allen was the first woman recipient of the ACM A.M. Turing Award.

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs
From ACM TechNews

CISA: Chinese State Hackers Are Exploiting F5, Citrix, Pulse Secure, Exchange Bugs

An advisory from the Cybersecurity and Infrastructure Security Agency (CISA) warns of attacks against U.S. federal networks by hacker groups associated with China's...

Bulletproofing RISC-V Cores
From ACM News

Bulletproofing RISC-V Cores

The RISC-V open standard instruction-set architecture can improve cybersecurity.

Woman Becomes First Healthcare Cyberattack Death
From ACM TechNews

Woman Becomes First Healthcare Cyberattack Death

A woman in Germany suffering a life-threatening illness was the first person to die from a cyberattack on a healthcare system.

The Phish Scale: NIST-Developed Method Helps IT Staff See Why Users Click on Fraudulent Emails
From ACM TechNews

The Phish Scale: NIST-Developed Method Helps IT Staff See Why Users Click on Fraudulent Emails

The Phish Scale could help organizations better train their employees to avoid being deceived by seemingly trustworthy emails.

Most Cybersecurity Reports Only Focus on the Cool Threats
From ACM TechNews

Most Cybersecurity Reports Only Focus on the Cool Threats

A study found just 82 of 629 commercial cybersecurity reports published in the last decade discuss threats to civil society, with the rest devoted to cybercrime...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account