Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Poor Password Security Led to Recent Water Treatment Facility Hack
From ACM News

Poor Password Security Led to Recent Water Treatment Facility Hack

The breach involved an unsuccessful attempt by an adversary to increase sodium hydroxide in the water supply to dangerous levels via the water treatment plant's...

Suspected Russian Hack Extends Far Beyond SolarWinds Software, Investigators Say
From ACM TechNews

Suspected Russian Hack Extends Far Beyond SolarWinds Software, Investigators Say

Federal investigators say there is evidence the suspected Russian hack of U.S. government and businesses went beyond compromising SolarWinds' software.

Doorbell Security Cameras Are Easily Hackable, Researchers Find
From ACM TechNews

Doorbell Security Cameras Are Easily Hackable, Researchers Find

Florida Institute of Technology researchers have demonstrated that smart home security systems, including doorbells connected to a wireless camera, can be hacked...

Deepfake Detectors Can Be Defeated, Computer Scientists Show for the First Time
From ACM TechNews

Deepfake Detectors Can Be Defeated, Computer Scientists Show for the First Time

Computer scientists at the University of California, San Diego have demonstrated that detectors programmed to spot deepfake videos can be beaten.

Lye-Poisoning Attack in Florida Shows Cybersecurity Gaps in Water Systems
From ACM TechNews

Lye-Poisoning Attack in Florida Shows Cybersecurity Gaps in Water Systems

Experts said hackers' attempted lye-poisoning of a drinking water reservoir in Oldsmar, FL, last Friday highlights the vulnerability of the U.S. water supply.

U.S. Gmail Users are Most Popular Targets for Email Phishing, Malware Attacks
From ACM News

U.S. Gmail Users are Most Popular Targets for Email Phishing, Malware Attacks

Third-party data breaches also make users more attractive targets for cyberattacks.

'Zoombombing' Research Shows Legitimate Meeting Attendees Cause Most Attacks
From ACM TechNews

'Zoombombing' Research Shows Legitimate Meeting Attendees Cause Most Attacks

A study by researchers at Binghamton and Boston universities indicates most zoombombing attacks are caused by legitimate attendees.

Tracking the Hackers
From ACM News

Tracking the Hackers

Dissecting the SolarWinds hack.

Blockchain Transactions Confirm Murky, Interconnected Ransomware Scene
From ACM TechNews

Blockchain Transactions Confirm Murky, Interconnected Ransomware Scene

A study by blockchain investigations firm Chainalysis found that cybercrime gangs often switch ransomware-as-a-service suppliers as they seek better profits.

Scientists Develop Method to Detect Fake News
From ACM TechNews

Scientists Develop Method to Detect Fake News

Researchers used machine learning to develop a method for identifying fake news even when such reports are repeatedly adapted.

How the United States Lost to Hackers
From ACM News

How the United States Lost to Hackers

America's biggest vulnerability in cyberwarfare is hubris.

Here's a Way to Learn If Facial Recognition Systems Used Your Photos
From ACM TechNews

Here's a Way to Learn If Facial Recognition Systems Used Your Photos

The Exposing.AI online tool lets people search image collections for photos of themselves, to learn if such images were used to train facial recognition systems...

Apple Fixes Another 3 iOS Zero-Days Exploited in the Wild
From ACM TechNews

Apple Fixes Another 3 iOS Zero-Days Exploited in the Wild

Apple has released patches for three iOS zero-day vulnerabilities.

The Scramble for Post-Quantum Cryptography
From ACM News

The Scramble for Post-Quantum Cryptography

Quantum computers are expected to undermine today's computer security.

Clearview AI’s Facial Recognition App Called Illegal in Canada
From ACM News

Clearview AI’s Facial Recognition App Called Illegal in Canada

Canadian authorities declared that the company needed citizens' consent to use their biometric information, and told the firm to delete facial images from its database...

High-Performance Computers Under Siege by Newly Discovered Backdoor
From ACM TechNews

High-Performance Computers Under Siege by Newly Discovered Backdoor

Researchers at Slovak security firm Eset said a newly discovered backdoor allows hackers to remotely execute arbitrary commands on some high-performance computer...

Google Says It's Too Easy for Hackers to Find New Security Flaws
From ACM News

Google Says It's Too Easy for Hackers to Find New Security Flaws

Attackers are exploiting the same types of software vulnerabilities over and over again, because companies often miss the forest for the trees

Google Pursues Plan to Remove Third-Party Cookies
From ACM TechNews

Google Pursues Plan to Remove Third-Party Cookies

Google is moving ahead with a plan to strip third-party cookies from its Chrome Web browser and replace them with privacy-friendly alternatives.

Quantum Computing Scientists Call for Ethical Guidelines
From ACM TechNews

Quantum Computing Scientists Call for Ethical Guidelines

Six quantum computing experts are raising ethical issues about the technology's potential to create new weapons and ramp up human genetic manipulation.

Researchers Propose Porcupine, a Compiler for Homomorphic Encryption
From ACM TechNews

Researchers Propose Porcupine, a Compiler for Homomorphic Encryption

A synthesizing compiler for homomorphic encryption can translate a plain-text unencrypted codebase into encrypted code on the fly.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account