Sign In

Communications of the ACM

News


An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Fertility Apps Collect, Share Intimate Data Without Users' Knowledge or Permission
From ACM TechNews

Fertility Apps Collect, Share Intimate Data Without Users' Knowledge or Permission

Many top-rated fertility apps collect and share personal information without the knowledge or permission of users, according to a new study.

Millions of Older Broadband Routers Have Security Flaws, Warn Researchers
From ACM TechNews

Millions of Older Broadband Routers Have Security Flaws, Warn Researchers

Millions of U.K. households use old broadband routers that hackers could exploit.

How to Keep Automated Electric Vehicles Safe
From ACM TechNews

How to Keep Automated Electric Vehicles Safe

A study by researchers at the University of Georgia, Kennesaw State University, and Temple University identified cybersecurity weaknesses that could threaten the...

Researchers Develop Protocols to Validate Integrity of ML Models
From ACM TechNews

Researchers Develop Protocols to Validate Integrity of ML Models

Cryptographic algorithms called zero-knowledge proof protocols are a mathematical method that enables the owner of an ML model to generate a succinct proof to demonstrate...

This Massive DDoS Attack Took Large Sections of a Country's Internet Offline
From ACM News

This Massive DDoS Attack Took Large Sections of a Country's Internet Offline

More than 200 organizations across Belgium, including the government and parliament, were affected by a DDoS attack that overwhelmed them with bad traffic.

Microsoft Finds Memory Allocation Holes in Range of IoT, Industrial Technology
From ACM TechNews

Microsoft Finds Memory Allocation Holes in Range of IoT, Industrial Technology

A Microsoft security research unit discovered a number of poor memory allocation operations in code used in Internet of Things and operational technology.

Breakthrough U.S. Army Technology is Game Changer for Deepfake Detection
From ACM TechNews

Breakthrough U.S. Army Technology is Game Changer for Deepfake Detection

Researchers have developed a deepfake detection method for supporting mission-essential tasks.

DOD Isn't Armed to Combat Growing Threat of Info Warfare, Experts Warn
From ACM News

DOD Isn't Armed to Combat Growing Threat of Info Warfare, Experts Warn

Experts will say in today's Congressional testimony that the U.S. can learn from how cyberthreats have evolved in addressing growing online information operations...

France’s Macron Eyes Artificial Intelligence to Monitor Terrorism
From ACM News

France’s Macron Eyes Artificial Intelligence to Monitor Terrorism

The move comes as the French president comes under pressure to crack down on terrorism and Islamist separatism.

Exclusive: Air Force Research Taps Quantum Computing
From ACM News

Exclusive: Air Force Research Taps Quantum Computing

The Air Force plans to partner with quantum computing software company QC Ware to harness its algorithms to better surveil unmanned aircraft.

Justice Department Convenes Task Force to Tackle Wave of Ransomware Attacks
From ACM TechNews

Justice Department Convenes Task Force to Tackle Wave of Ransomware Attacks

The U.S. Department of Justice launched the Ransomware and Digital Extortion Task Force to address the increase in ransomware attacks on critical U.S. organizations...

Viable Plan or Security Theatre? Europe Embraces Digital Health Pass
From ACM TechNews

Viable Plan or Security Theatre? Europe Embraces Digital Health Pass

The EU Commission is expected to award a contract soon for a central system to verify "digital green passes" for those who have been vaccinated against COVID-19...

Cyber-Securing the Home Office
From ACM News

Cyber-Securing the Home Office

Patching the security holes that arise when working from home.

A Growing Problem of 'Deepfake Geography': How AI Falsifies Satellite Images
From ACM TechNews

A Growing Problem of 'Deepfake Geography': How AI Falsifies Satellite Images

Researchers used satellite photos of three cities and manipulation of video and audio files to identify new methods of detecting deepfake satellite images.

Apple and Google Are Killing the (Ad) Cookie. Here's Why
From ACM News

Apple and Google Are Killing the (Ad) Cookie. Here's Why

Farewell, advertising cookie.

Emotet Botnet Harvested 4.3 Million eMail Addresses; FBI Using 'Have I Been Pwned' to Alert the Victims
From ACM News

Emotet Botnet Harvested 4.3 Million eMail Addresses; FBI Using 'Have I Been Pwned' to Alert the Victims

The law enforcement agency is working with the data breach service to alert people that their information may have been harvested by the botnet.

Researchers Rev Up Innovative ML Strategies to Reclaim Energy, Time, and Money Lost in Traffic Jams
From ACM TechNews

Researchers Rev Up Innovative ML Strategies to Reclaim Energy, Time, and Money Lost in Traffic Jams

Researchers found that next-generation sensors and controls used with high-performance computing, analytics, and machine learning could minimize road congestion...

SolarWinds, Microsoft Hacks Prompt Focus on Zero-Trust Security
From ACM TechNews

SolarWinds, Microsoft Hacks Prompt Focus on Zero-Trust Security

A U.S. Department of Defense spokesperson said the public and private sectors should adopt zero-trust models of security.

Multiple Agencies Breached by Hackers Using Pulse Secure Vulnerabilities
From ACM TechNews

Multiple Agencies Breached by Hackers Using Pulse Secure Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency said hackers had infiltrated federal agencies and other critical organizations.

Catching the Fakes
From Communications of the ACM

Catching the Fakes

Applying neural networks to images helps identify counterfeit goods.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account