Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Technological Responses to COVID-19
From Communications of the ACM

Technological Responses to COVID-19

Companies are finding new ways to enforce social distancing, clean public spaces, and provide substitutes for human workers.

Fake Collaboration Apps Steal Data as Staff Struggle with Home-Working Security
From ACM TechNews

Fake Collaboration Apps Steal Data as Staff Struggle with Home-Working Security

According to cybersecurity company Wandera's Cloud Security Report 2021, malware attacks increasingly targeted remote workers last year.

Hackers Used Four Zero-Days to Infect Windows, Android Devices
From ACM TechNews

Hackers Used Four Zero-Days to Infect Windows, Android Devices

Investigators with Google's Project Zero exploit research team uncovered a hacking campaign that used four zero-day exploits to install malware on Android and Windows...

Quantum Internet Signals Beamed Between Drones a Kilometer Apart
From ACM TechNews

Quantum Internet Signals Beamed Between Drones a Kilometer Apart

Researchers have sent entangled photons between two 35-kilogram drones located a kilometer apart, a development that could pave the way for quantum encryption. ...

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys
From ACM TechNews

Side-Channel Attack Can Recover Encryption Keys From Google Titan Security Keys

Researchers at French security company NinjaLab found a vulnerability impacting chips used in Google Titan and YubiKey hardware security keys.

Microsoft, Oracle and Salesforce Join Push for Digital Vaccination Credentials
From ACM News

Microsoft, Oracle and Salesforce Join Push for Digital Vaccination Credentials

In the U.S., there is no federal system consumers can use to get easy access to their immunization records online and establish their vaccination status for work...

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks
From ACM TechNews

Hack the Army Bug Bounty Challenge Asks Hackers to Find Vulnerabilities in Military Networks

The Defense Digital Service and HackerOne are calling on military and civilian hackers to identify cybersecurity vulnerabilities in the U.S. Army's computer systems...

Just Think: The Outlook for BCI
From ACM News

Just Think: The Outlook for BCI

Where Brain-Computer Interfaces are headed.

Slouch or Slack Off, This 'Smart' Office Chair Cushion Will Record It
From ACM TechNews

Slouch or Slack Off, This 'Smart' Office Chair Cushion Will Record It

"Smart cushions" designed by a Chinese technology company and used in office chairs have engendered controversy over privacy and surveillance.

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector
From ACM TechNews

As Coronavirus Cases Surge, So Do Cyberattacks Against the Healthcare Sector

Cybersecurity firm Check Point found a 45% increase in cyberattacks against the global healthcare sector since November, versus a 22% uptick against all worldwide...

U.K. Government Use of 'General Warrants' to Authorize Computer, Phone Hacking Is Unlawful: Court
From ACM TechNews

U.K. Government Use of 'General Warrants' to Authorize Computer, Phone Hacking Is Unlawful: Court

The U.K.'s High Court has ruled that government security and intelligence services cannot use "general warrants" to indiscriminately hack domestic mobile phones...

Airport Screening While Wearing Masks? Facial Recognition Tech Shows Up to 96% Accuracy in Recent Test
From ACM TechNews

Airport Screening While Wearing Masks? Facial Recognition Tech Shows Up to 96% Accuracy in Recent Test

What was described as a controlled test of facial recognition technologies found potential for accurately identifying individuals on security lines at airports...

Trump Administration Rolls Out Plan to Secure Maritime Sector Against Cyber Threats
From ACM TechNews

Trump Administration Rolls Out Plan to Secure Maritime Sector Against Cyber Threats

The White House has unveiled a plan to protect the U.S. maritime transportation sector against cybersecurity threats.

Nissan Source Code Leaked Online After Git Repo Misconfiguration
From ACM TechNews

Nissan Source Code Leaked Online After Git Repo Misconfiguration

Software engineer Tillie Kottmann said Nissan North America's misconfiguration of a Bitbucket Git server led to the online leakage of the automaker’s source code...

Telegram Feature Exposes Your Precise Address to Hackers
From ACM TechNews

Telegram Feature Exposes Your Precise Address to Hackers

Hackers can exploit the Telegram messenger application employed in Android devices and iPhones to pinpoint users' precise locations.

Malware Uses WiFi BSSID for Victim Identification
From ACM TechNews

Malware Uses WiFi BSSID for Victim Identification

A newly discovered malware strain collects an infected user's Basic Service Set Identifier, in order to ascertain the location of the user and their Wi-Fi access...

Hackers Exploit Backdoor Built Into Zyxel Devices
From ACM TechNews

Hackers Exploit Backdoor Built Into Zyxel Devices

Niels Teusink, a researcher at Netherlands-based security firm Eye Control, found that hackers are attempting to exploit a backdoor built into several Zyxel device...

Digital IDs Make Their Mark
From ACM News

Digital IDs Make Their Mark

Encrypted identification data on a smartcard or smartphone can deliver significant benefits while boosting security, but raise concerns about privacy and the potential...

Microsoft Says Russian Hackers Viewed Some of Its Source Code
From ACM TechNews

Microsoft Says Russian Hackers Viewed Some of Its Source Code

Microsoft on Thursday said the Russian exploit of U.S. government agencies and private corporations extended further into its network than previously thought.

Insecure Wheels: Police Turn to Car Data to Destroy Suspects' Alibis
From ACM TechNews

Insecure Wheels: Police Turn to Car Data to Destroy Suspects' Alibis

Law enforcement agencies increasingly are using data stored in an automobile's onboard computers to solve crimes.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account