Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Windows Computers Targets of 83% of Malware Attacks in Q1
From ACM TechNews

Windows Computers Targets of 83% of Malware Attacks in Q1

Microsoft Windows and Android security evaluator AV Test's 2019/2020 Security Report found malware targeting Windows computers constituted 83.45% of all malware...

QUT Algorithm Could Quash Twitter Abuse of Women
From ACM TechNews

QUT Algorithm Could Quash Twitter Abuse of Women

An algorithm developed at the Queensland University of Technology in Australia can identify misogynistic content on Twitter with 75% accuracy.

NSA and Cyber Command chief pledges muscular defense of November election
From ACM News

NSA and Cyber Command chief pledges muscular defense of November election

The preparations include sharing information with the Department of Homeland Security to help harden election systems against hacking, and with the FBI to help...

Researchers Develop Detection Method to Protect Army Networks
From ACM TechNews

Researchers Develop Detection Method to Protect Army Networks

U.S. Army researchers have developed a novel algorithm which, they say, can protect networks by detecting suspicious activity missed by current analytical methods...

The Lesson We’re Learning From TikTok? It’s All About Our Data
From ACM News

The Lesson We’re Learning From TikTok? It’s All About Our Data

We should minimize how much we share with all of our favorite and not-so-favorite apps.

Visa Unveils More Powerful AI Tool That Approves or Denies Card Transactions
From ACM News

Visa Unveils More Powerful AI Tool That Approves or Denies Card Transactions

The deep-learning application makes more accurate decisions on behalf of banks experiencing network disruptions, Visa says.

Army Researchers Develop Sensors for Small Drones
From ACM TechNews

Army Researchers Develop Sensors for Small Drones

Researchers have developed a novel sensor and software application to help unmanned aerial systems avoid active power lines.

U.S. Agency Takes Part in Simulated Cyberattack on Critical Systems
From ACM TechNews

U.S. Agency Takes Part in Simulated Cyberattack on Critical Systems

The U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency  successfully completed a biannual simulated cyberattack on critical...

AI on Edge
From Communications of the ACM

AI on Edge

Shifting artificial intelligence to the "edge" of the network could transform computing . . . and everyday life.

Microsoft Pays $13.7 Million in Security Bug Bounties
From ACM TechNews

Microsoft Pays $13.7 Million in Security Bug Bounties

Microsoft has awarded $13.7 million to security researchers since July 2019 for reporting bugs in its software, which is triple the $4.4 million from the same period...

Security Gap Allows Eavesdropping on Mobile Phone Calls
From ACM TechNews

Security Gap Allows Eavesdropping on Mobile Phone Calls

Researchers from Ruhr-Universitat Bochum and New York University Abu Dhabi eavesdropped on cellphone calls by exploiting a security flaw in basestation implementations...

NSA, FBI Expose Russian Intelligence Hacking Tool
From ACM TechNews

NSA, FBI Expose Russian Intelligence Hacking Tool

The U.S. National Security Agency and Federal Bureau of Investigation have publicly exposed a sophisicated hacking tool that Russian intelligence used to penetrate...

Tech Firms Broaden Group to Secure U.S. Election
From ACM TechNews

Tech Firms Broaden Group to Secure U.S. Election

Facebook, Google, and other major technology firms Wednesday announced an expansion of their coalition to secure the November U.S. presidential election, and met...

Hackers Say 'Jackpotting' Flaws Tricked Popular ATMs Into Spitting Out Cash
From ACM TechNews

Hackers Say 'Jackpotting' Flaws Tricked Popular ATMs Into Spitting Out Cash

Security researchers unveiled two new "jackpotting" flaws that force Nautilus ATMs to dispense cash on command.

Black Hat: How Hackers Gain Root Access to SAP Enterprise Servers Through SolMan
From ACM TechNews

Black Hat: How Hackers Gain Root Access to SAP Enterprise Servers Through SolMan

At the Black Hat USA 2020 conferences, cybersecurity researchers explained how attackers could exploit vulnerabilities in SAP Solution Manager (SolMan) to gain...

NSA Warns Cellphone Location Data Could Pose National-Security Threat
From ACM TechNews

NSA Warns Cellphone Location Data Could Pose National-Security Threat

The U.S. National Security Agency has released new guidance for military and intelligence community staff, warning of threats to national security from cellphone...

North Korean Hacking Group Attacks Israeli Defense Industry
From ACM News

North Korean Hacking Group Attacks Israeli Defense Industry

Israel says the attack was thwarted, but a cybersecurity firm says it was successful. Some officials fear that classified data stolen by North Korea could be shared...

Picking Locks with Audio Technology
From ACM News

Picking Locks with Audio Technology

How eavesdropping smartphones could give thieves a copy of your front door key.

Back to School? Look Out for Covid-Tracking Surveillance Tech
From ACM TechNews

Back to School? Look Out for Covid-Tracking Surveillance Tech

Surveillance technology deployed in schools to prevent or contain coronavirus infection raises issues about its effectiveness, as well as its post-pandemic applications...

Is the U.S. about to Split the Internet?
From ACM News

Is the U.S. about to Split the Internet?

U.S. Secretary of State Mike Pompeo says he wants a "clean" Internet.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account