acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Have You Really Deleted Your Personal Data From Your Device When You Dispose of It?
From ACM TechNews

Have You Really Deleted Your Personal Data From Your Device When You Dispose of It?

Many users leave sensitive personal information on their electronic devices when discarding them, according to scientists at Canada's universities of Guelph and...

How Safe is a Quantum-Safe Virtual Private Network?
From ACM News

How Safe is a Quantum-Safe Virtual Private Network?

Verizon aims to find out by testing the technology, which is geared at enhancing encryption methods using session key exchange security mechanisms, the carrier...

At White House Summit, U.S. Tech Giants Promise To Spend Billions More To Bolster Cybersecurity
From ACM News

At White House Summit, U.S. Tech Giants Promise To Spend Billions More To Bolster Cybersecurity

The tech giants also pledged to step up their efforts to address a dire talent shortage that has hampered efforts to counter hacking.

DARPA Drone Cybersecurity Software Foils Hackers in Demo
From ACM TechNews

DARPA Drone Cybersecurity Software Foils Hackers in Demo

The U.S. Defense Advanced Research Projects Agency says the hackers it invited to try to hack the High-Assurance Cyber Military Systems all failed.

38M Records Were Exposed Online—Including Contact-Tracing Info
From ACM News

38M Records Were Exposed Online—Including Contact-Tracing Info

Misconfigured Power Apps from Microsoft led to more than 1,000 Web apps accessible to anyone who found them.

Policy Groups Ask Apple to Drop Plans to Inspect iMessages, Scan for Abuse Images
From ACM TechNews

Policy Groups Ask Apple to Drop Plans to Inspect iMessages, Scan for Abuse Images

An open letter from more than 90 policy and rights groups worldwide calls on Apple to drop a plan to scan children's messages for nudity and adults' phones for...

Photonic Processors Light the Way
From Communications of the ACM

Photonic Processors Light the Way

Highly efficient light-based processors can overcome the bottlenecks of today's electronics.

Robot Could Operate Docking Station Inside the Gut
From ACM TechNews

Robot Could Operate Docking Station Inside the Gut

A new robotic insulin delivery system can be implanted surgically in the abdomen, and resupplied with insulin via swallowed magnetic capsules.

China Passes One of the World's Strictest Data-Privacy Laws
From ACM TechNews

China Passes One of the World's Strictest Data-Privacy Laws

China's top legislative body has passed a law requiring those handling the personal data of Chinese citizens to minimize data collection and obtain prior consent...

Millions of Web Camera, Baby Monitor Feeds Exposed
From ACM TechNews

Millions of Web Camera, Baby Monitor Feeds Exposed

Researchers have identified a vulnerability in a software development kit affecting more than 83 million smart devices.

Levitation: Classic Magic Trick May Enable Quantum Computing
From ACM News

Levitation: Classic Magic Trick May Enable Quantum Computing

A new project will use the electric field in an accelerator cavity to try to levitate a tiny metallic particle, allowing it to store quantum information.

DHS Eyes CMMC Model
From ACM News

DHS Eyes CMMC Model

DHS is working to determine a strategy for implementing "a means of ensuring a contractor has key cybersecurity and cyber hygiene practices in place as a condition...

Google Can Take Two Months to Remove Malware Apps from App Store
From ACM TechNews

Google Can Take Two Months to Remove Malware Apps from App Store

It takes an average of 77 days from detection for Google to remove apps that may contain malware from the Google Play Store, accoriding to a recent analysis.

 Optical Adversarial Attack Can Change the Meaning of Road Signs
From ACM News

Optical Adversarial Attack Can Change the Meaning of Road Signs

An OPtical ADversarial attack uses structured illumination to alter the appearance of target objects, and requires only a commodity projector, a camera, and a computer...

Blockchain Technology Could Be Set for Major Security Boost
From ACM TechNews

Blockchain Technology Could Be Set for Major Security Boost

A team of researchers has strengthened blockchain networks against potential quantum computing threats through the development of a post-quantum cryptographic layer...

Is Your Mobile Provider Tracking Your Location? This Technology Could Stop It.
From ACM TechNews

Is Your Mobile Provider Tracking Your Location? This Technology Could Stop It.

A new system can thwart the tracking of cellphone users by network operators while maintaining seamless connectivity.

Stanford Researchers Use AI to Unlock Extreme Weather Mysteries
From ACM TechNews

Stanford Researchers Use AI to Unlock Extreme Weather Mysteries

New machine-learning approach helps scientists understand increased frequency of extreme precipitation days in the Midwest

Wildfire Simulation Heats Up
From ACM TechNews

Wildfire Simulation Heats Up

Computer simulations can predict the spread of wildfires through sections of a real forest

Researchers Develop Smart-Car Identity and Access Management System
From ACM TechNews

Researchers Develop Smart-Car Identity and Access Management System

Researchers at City, University of London have developed an identity and access management system to make smart cars less vulnerable to cyber attacks.

Security Company Warns of Mitsubishi Industrial Control Vulnerabilities
From ACM TechNews

Security Company Warns of Mitsubishi Industrial Control Vulnerabilities

Researchers at cybersecurity firm Nozomi Networks Labs have identified five vulnerabilities in Mitsubishi's safety programmable logic controllers, centered on the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account